News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Audit-proof data protection for cloud infrastructures 
Audit-proof data protection for cloud infrastructures

The patented microshard process defies current data protection concerns in relation to cloud infrastructures: data is broken down into single-digit bytes without loss of performance. These microshards are then stored in cloud environments or on on-premises servers. Generally applicable regulations such as the General Data Protection Regulation (GDPR) or industry-specific standards such as the KRITIS regulation of the BSI or the telematics infrastructure often impair corporate flexibility and agility. They go hand in hand with new investments. Corporate decision-makers are increasingly unsettled. In view of the unclear legal situation, many therefore hesitate to outsource parts of their infrastructure to a cloud infrastructure. Data protection for cloud infrastructures In addition, after…

Read more

Managed NDR services to analyze network traffic
Managed NDR services to analyze network traffic

ForeNova expands its NDR protection with three new managed detection and response services for analyzing network traffic, such as for emergencies or for security analyst reports. ForeNova, provider of Network Detection and Response (NDR) solutions and services, is expanding its Managed Detection and Response (MDR) offering with three new services. With ForeNova TA, certified ForeNova security experts provide a one-time security posture assessment based on traffic across the network. With ForeNova IR (Incident Response), the experts support companies in analyzing and blocking malware during an attack. SME: Managed NDR for analysis As part of ForeNova Managed NDR…

Read more

Microsoft OneDrive: Cryptojacking campaign via DLL sideloading
Microsoft OneDrive: Cryptojacking campaign via DLL sideloading

Bitdefender experts warn of a cryptojacking campaign via a DLL sideloading vulnerability in Microsoft OneDrive. Bitdefender has already detected 700 attacked Microsoft OneDrive instances in May and June 2022. Germany is one of the hardest hit. Cryptojacking is a growing danger: hackers use the resources of infected PCs or mobile devices to use their resources for their own cryptomining. In May and June 2022, Bitdefender detected a global attack campaign in which cyber criminals exploit known DLL sideloading vulnerabilities in Microsoft OneDrive to install cryptomining malware on victims' systems. In principle, they could...

Read more

Remote maintenance software with SSL & TLS for more security
Remote maintenance software with SSL & TLS for more security

ProSoft announces a new version of its NetSupport Manager remote maintenance software with enhanced security features. Version 14 offers more flexibility and security through gateway encryption with SSL/TLS certificates. IT security expert and Trusted Advisor ProSoft presents the new major release v14 of NetSupport Manager - a high-speed solution for secure remote maintenance and remote control of servers, workstations and smart devices from the UK software developer of the same name. As a NetSupport Premier Partner, ProSoft offers training, support and consulting in addition to the software. "The cross-platform remote control software solution now includes a whole range of new and improved features to minimize support time...

Read more

MDR Service open to cyber security technologies from other manufacturers
MDR Service open to cyber security technologies from other manufacturers

Sophos MDR now also integrates telemetry from endpoint, firewall, cloud, identity, email and other third-party security solutions into the Sophos Adaptive Cybersecurity Ecosystem. Companies are free to choose which service they use. Sophos today announced new compatibilities between third-party security technologies and its Sophos Managed Detection and Response (MDR) service. The goal is to detect and fix attacks in different customer and operating environments even faster and more precisely. Sophos MDR, currently with more than 12.000 customers, integrates the telemetry of endpoint, firewall, cloud, identity, email and other...

Read more

Zero Trust: Promotion with hardware security keys for MFA
Zero Trust: Promotion with hardware security keys for MFA

Cloudflare makes hardware security keys more accessible than ever to millions of customers and increases security with MFA. An exclusive offer has been created in collaboration with Yubico to end phishing attacks once and for all. Cloudflare, Inc. is the security, performance and reliability specialist dedicated to creating a better Internet. The company presents a new offering that makes physical security keys the most accessible and economical solution for customers to better protect their business and employees. Cloudflare customers can use security keys from Yubico, the leading provider of hardware security keys and thus the…

Read more

Automated detection of zero-day vulnerabilities
Automated detection of zero-day vulnerabilities

The European IoT/OT security specialist ONEKEY enables the software-supported, automated analysis of unknown zero-day vulnerabilities in industrial products and controls for the first time. This category represents one of the greatest risks for everything that uses software: "Zero-day attacks use security gaps that may have existed undetected for a long time and were not recognized by the manufacturer of the devices and systems. Therefore there is no patch for the vulnerability and global attacks on affected devices can be devastating," says Jan Wendenburg, CEO of ONEKEY. Flourishing trade in vulnerabilities These vulnerabilities are even traded among hackers, a zero-day vulnerability in iOS,…

Read more

Pentest-as-a-Service offering for large companies
Pentest-as-a-Service offering for large companies

HackerOne, the leading security platform in Attack Resistance Management, has unveiled its enhancements: Pentest-as-a-Service (PTaaS) offering. The innovations include self-service capabilities for scoping and launching tests, as well as new automation features to streamline the user experience on the HackerOne platform. Enterprises can now manage their jobs more efficiently and receive real-time insights from experienced pentesters to reduce security risks and improve attack defenses. To date, HackerOne's pentesters have reported more than 6.000 verified vulnerabilities. 6.000 vulnerabilities uncovered “HackerOne Pentest eliminates the inefficient aspects of traditional pentesting solutions,” says Ashish…

Read more

Mind the (Air) Gap
Mind the (Air) Gap

The reliable backup, organization and archiving of your company data must have top priority. In times of cyber war, phishing and ransomware attacks, data backup plays a crucial role. An excellent protection against data theft or misuse is air gap (or air gapping). We explain why air gaps are essential for reliable and cost-effective backup. In short, an air gap means physical isolation from other computers, intranets, or the Internet by transporting a storage medium. The basic concept of an air gap is simple: if data can't be accessed, then it can't...

Read more

DDoS attacks, carpet bombing, DNS water torture
DDoS attacks, carpet bombing, DNS water torture

As the new NETSCOUT Threat Intelligence Report shows, attackers are continuing cyberattacks with greater precision and innovative attack methods. TCP-based, DNS water torture and carpet bombing attacks in particular dominate the DDoS threat landscape. NETSCOUT announced the results of its Threat Intelligence Report for the first half of 2022. The results show how sophisticated and successful cybercriminals have become in circumventing defenses using new DDoS attack vectors and other methods. ATLAS DDoS Attack Statistics NETSCOUT's Active Level Threat Analysis System (ATLAS™) collects DDoS attack statistics from most ISPs, major data centers, government and corporate networks worldwide. This data provides information about…

Read more