News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware attack recovery
Ransomware attack recovery

Data protection and ransomware recovery solutions provider by market share announces the availability of the new Veeam Cyber ​​Secure Program to assist in recovering from ransomware attacks. The program combines Veeam's purpose-built technology with a team of experts to help organizations prepare, protect and recover from ransomware. With the range of this program, Veeam offers customers important assistance in the fight against ransomware. It begins with pre-attack support, including architectural planning, implementation support, and quarterly...

Read more

Threat report for the second half of 2023
Threat report for the second half of 2023

A cybersecurity AI provider has released its End of Year Threat Report for the second half of 2023. The report is based on data from the entire customer base and uncovers important developments in the areas of multi-functional malware, loaders, ViperSoftX and phishing emails. According to Darktrace's analysis, in the second half of 2023, the most commonly observed threat type was Malware-as-a-Service (MaaS), which, along with Ransomware-as-a-Service (RaaS), accounted for the majority of malicious tools used in cyberattacks made up. Due to high demand and repeat subscription-based revenue, Darktrace expects the…

Read more

Machine learning in cybersecurity
Machine learning in cybersecurity

For a dynamic and powerful security platform, machine learning (ML)-based tools can be an essential element. The technology can be used in a variety of tasks, such as detecting malware and network anomalies, categorizing user behavior, prioritizing vulnerabilities and threats, and also accurately predicting future attacks. Additionally, their use can help improve model risk, streamline threat classification – and even accurately predict immediate and potential attacks. In addition, ML-based automation relieves employees by minimizing manual effort. So ML has a lot…

Read more

Fake Europcar hack
Fake Europcar hack

At the end of January, alleged data from around 50 million Europcar customers was offered in an underground forum. Europcar reacted quickly and denied that it was a real file. The data is neither consistent nor are the email addresses in particular known to Europcar. While Europcar suggested that this data was generated using generative AI (e.g. ChatGPT), other security researchers are of the opinion that no AI was at work here. What they all have in common, however, is the opinion that this data was generated by machines. Suspicions quickly arose in the forum too...

Read more

Asking the right questions
Asking the right questions

“Predictions are difficult, especially when they concern the future.” This statement, which has been attributed to either the American author Mark Twain or the German comedian Karl Valentin, can easily be applied to cyber security. In our industry, it is sometimes even difficult to predict what will happen in the next 30 seconds - let alone twelve months. My colleagues and I believe that it is more productive to forego (more or less vague) forecasts and instead ask (difficult and unpleasant) questions - in order to generate new ways of thinking...

Read more

Password-free security
Password-free security

Passwords represent a high security risk for companies. Through password theft, attackers can often penetrate company systems unnoticed and cause a lot of damage. Passwordless authentication is therefore trending. CyberArk shows what companies should pay attention to during implementation, especially with regard to the IAM solution used. Everyone knows it: Creating a new password is an annoying process because, for example, it has to be at least eight characters long and contain upper and lower case letters, numbers and special characters. But it's a necessary evil since passwords are still one of the most popular targets for attackers...

Read more

90 percent of companies pay ransoms
90 percent of companies pay ransoms

90 percent of companies have paid ransoms in the last two years in order to quickly get their data back after cyber attacks, close leaks and maintain operations. This is shown by a study by Censuswide on behalf of Cohesity, a global provider of AI-powered data management and security. According to the survey, 93 percent of the international companies surveyed want to continue to pay ransoms in the event of a security attack and violate their “do-not-pay” guidelines in an emergency. Only 1 percent of companies categorically rule out paying ransoms. 35 percent of companies…

Read more

Cyber ​​attacks are becoming increasingly sophisticated
Cyber ​​attacks are becoming increasingly sophisticated

A leading provider of zero-trust and zero-knowledge solutions for protecting credentials, privileged access and remote connections, releases key findings from its latest study on current cybersecurity developments. The global survey of more than 800 IT security leaders found that the vast majority (95 percent) believe cyberattacks are now more sophisticated than ever before. AI-powered attacks are the most serious and phishing attacks are widely believed to be the fastest growing. Looking ahead to 2024, the cybersecurity landscape presents a mix of frightening factors, with emerging AI threats looming large…

Read more

NIS2 is just around the corner
NIS2 is just around the corner

In a few months, numerous companies will have to implement the NIS2 directive. The new EU directive requires strict measures to be implemented to ensure cybersecurity. At first glance, this period of time may seem long enough, but building an adequate security structure does not happen overnight. NTT Ltd., a leading IT infrastructure and services company, clears up misconceptions surrounding the NIS2 Directive and shows the best way to implement it. ​The NIS2 Directive is an EU-wide network and information security legislation that came into force on January 16, 2023 and has been adopted by member states…

Read more

Do companies even get cyber insurance?
Do companies even get cyber insurance? - KI MS

Cyber ​​insurance is not just a question of company strategy, but also whether you get it at all. The new Sophos guide to cyber insurance helps management and IT managers in companies better understand the cyber insurance market. After all, there are unavoidable requirements that must be met in order to ensure that insurance is as economical as possible. Companies often secure additional technical security through cyber insurance. Behind this strategy is, on the one hand, the knowledge of the danger of possibly backward in-house security and, on the other hand, a business calculation on the part of the management team. Every second company affected by attacks Sure…

Read more