News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Malware against minorities: Uyghurs monitored for years

Check Point security researchers have uncovered an ongoing phishing campaign targeting the Muslim minority in western China. The mobile malware, distributed via spear phishing campaigns, aims to monitor the Uyghurs. An analysis by Check Point. Check Point Research, the research arm of Check Point Software Technologies Ltd., a leading global provider of cyber security solutions, emphasizes that there is no indication that any country is behind the espionage. However, some other security researchers claim that China is again behind the attack against the Uyghurs, since the Chinese leadership has repeatedly…

Read more

Zero Trust SIM for BYOD protects all traffic
Zero Trust SIM for BYOD protects all traffic

Cloudflare has introduced a new solution: Zero Trust SIM. This is the industry's first Zero Trust solution for securing mobile devices at the SIM level. This also allows end devices to be secured according to the BYOD principle and data traffic to be scanned for dangers. Cloudflare announced the development of the Cloudflare Zero Trust SIM - the first solution to secure every packet of data sent from a mobile device. With the Zero Trust SIM that Cloudflare developed, companies can quickly and securely connect their employees' devices to Cloudflare's global network. Organizations can view devices directly in Cloudflares...

Read more

Report: Ransomware attacks continue to increase
Report: Ransomware attacks continue to increase

A new cybersecurity survey by Hornetsecurity shows that ransomware attacks continue to increase: 20 percent of all reported attacks took place in the last 12 months. 60 percent of the attacks were carried out by phishing attempts. The survey was conducted among more than 2.000 IT professionals. The 2022 Ransomware Report, for which cybersecurity specialist Hornetsecurity surveyed over 2.000 IT executives, shows that 24% of companies have already been victims of a ransomware attack. Compared to last year, this number increased by three percentage points. In addition, every fifth attack (20%) took place in the last year - a clear indication that cyber attacks are always...

Read more

One-third of login attempts with stolen login credentials
One-third of login attempts with stolen login credentials

In its latest State of Secure Identity Report, Okta, a provider of identity solutions, shows that attempts to log in with stolen credentials – the so-called “credential stuffing” – are the biggest threat to customer accounts. For the trends, examples, and observations presented in the report, Okta evaluated billions of authentications on its Auth0 platform. In credential stuffing, attackers exploit the habit of some users to use a single password for multiple logins. It begins by stealing the username and password, then using automated tools to access other accounts belonging to that user...

Read more

Early threat detection and zero loss strategy
Early threat detection and zero loss strategy

Commvault, a leading provider of data and information management in cloud and on-premises environments, has introduced its data security service Metallic ThreatWise with threat detection and zero-loss strategy. The solution provides technologies for early detection of even unknown cyber threats, even before they reach their target and affect business operations. According to a survey conducted by the Enterprise Strategy Group, only 12 percent of IT leaders surveyed felt confident they had the right tools and protection required anywhere, to protect data both in the on-premises data center and in the cloud . Early warning function for…

Read more

Ransomware: Legacy technology makes businesses more vulnerable 
Ransomware: Legacy technology makes businesses more vulnerable

The results of a new global study commissioned by Cohesity show that nearly half of the companies surveyed are using legacy backup and recovery infrastructure to manage and protect their data. Forty-nine percent of respondents say their solutions were built before 49—well before the multicloud era and onslaught of cyberattacks organizations are facing today. In addition, many IT and security teams do not appear to have a concrete plan for how to proceed in the event of a cyber attack. Nearly 2010 percent of respondents expressed concern when asked if their…

Read more

Intrusion prevention even with encrypted network traffic
Intrusion prevention even with encrypted network traffic NDR

A reliable IPS - Intrusion Prevention System should also protect against encrypted network traffic and zero-day attacks. However, since many solutions work with signature-based detection, they cannot usually protect against zero-day attacks. The new NDR from ExeonTrace does IPS at the same time. With ExeonTrace, the Swiss security company Exeon Analytics offers a solution for detecting intruders that goes far beyond the capabilities of conventional intrusion prevention systems (IPS). In particular, ExeonTrace can also detect zero-day attacks, against which IPS solutions cannot offer any protection due to their signature-based detection. Such systems are suitable...

Read more

More data protection vs. less data bureaucracy
More data protection vs. less data bureaucracy

The level of data protection in Germany is far too low, according to 37 percent of Germans. On the contrary, according to 35 percent, who rate it as far too high. These contrary results were brought to light by the "Data Protection Report 2022/23", which is based on a current survey by the Hamburg high-security data service provider TeamDrive GmbH. Study director Detlef Schmuck explains what appears to be a paradoxical range of opinions at first glance: “Most people want their personal data to be protected. But they don't think that the current legislation is suitable for this." The data security expert gives an example: "It seems like a joke that you on...

Read more

CIO Survey on Growing Cloud Complexity
CIO Survey on Growing Cloud Complexity

A survey of 1.300 CIOs shows that growing cloud complexity is an increasing challenge for companies. The data explosion through cloud-native technology stacks exceeds human management capabilities. Only monitoring and data analysis solutions can keep track. Dynatrace, the "Software Intelligence Company," has released the results of an independent global survey of 1.303 CIOs and senior cloud and IT managers. The results show that with the increasing trend towards cloud-native architectures, the data generated in such environments exceeds the ability of current solutions to produce meaningful analytics. CIOs are finding their...

Read more

Post-quantum cryptography: encryption against quantum computers
Post-quantum cryptography: encryption against quantum computers

Algorithms used today for encryption may soon prove too weak - once quantum computers become practical. Algorithms and hardware must therefore be developed that can also withstand these powerful supercomputers: post-quantum cryptography. A few years ago, the US federal agency National Institute of Standards and Technology (NIST) initiated a process to define/evaluate quantum-resistant algorithms. The potential candidates were selected in various rounds. In total, more than 80 algorithms were proposed, some of which were dropped quite early. The reason for this was that mathematical attacks were developed for quantum computers that break the algorithms...

Read more