News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Encrypted malware and Office vulnerabilities are a cause for concern
Encrypted malware and Office vulnerabilities are a cause for concern

WatchGuard's current Internet Security Report also documents the Emotet comeback and increasing attacks on SCADA systems. Google Chrome and Microsoft Office-based threats are also on the rise. WatchGuard Technologies' Internet Security Report's latest findings on top malware trends and network threats are in, showing an overall decrease in malware for the second quarter of 2022 compared to peaks in the first half of last year. However, Google Chrome and Microsoft Office-based threats are on the rise. Internet Security Report for the second quarter of 2022 And also with regard to the potential danger...

Read more

Cyber ​​attack on Optus: Millions of customer data stolen
Cyber ​​attack on Optus: Millions of customer data stolen

On September 22, the Australian telecommunications company Optus fell victim to a cyber attack. The attacker captured millions of customer data. Optus is Australia's second largest telecommunications company with 9,8 million customers. How many customers are affected and to what extent is still being determined. According to media reports, such as The Guardian, 2,8 million customers are affected to a greater extent. Information that may have been disclosed includes names, dates of birth, phone numbers, email addresses, and — for a subset of customers — addresses and identification document numbers such as driver’s license or passport numbers, like Optus on its…

Read more

Cloud collaboration platform with eSignature feature
Cloud collaboration platform with eSignature feature

Electronic signature at the push of a button: Tresorit expands cloud collaboration platform with eSignature function. The integrated solution "Tresorit eSign" combines convenience with security and ensures a comprehensively protected and legally compliant document management workflow. Tresorit, the Swiss-Hungarian specialist for end-to-end encrypted ("e2ee") cloud collaboration and subsidiary of Swiss Post, is now offering its customers the option of adding electronic signatures to documents at the push of a button. The function fits seamlessly into Tresorit's highly secure digital workspace platform, in which signatures can now be conveniently requested and corresponding documents managed. With the new function package, the company is taking another central step...

Read more

Big hurdles in GDPR compliance in companies

Data protection is becoming more and more important, while at the same time the amount of data is increasing rapidly. Without a strategic approach, companies are lost. Exterro shows how companies overcome the four major hurdles on the way to GDPR compliance. The large variety of compliance and data protection regulations alone is an enormous challenge. Companies have to comply with different regulations worldwide and even within Europe, which is made more difficult by the fact that these regulations are constantly changing. They are therefore faced with the difficult task of continuously adapting their internal processes so that they always comply with all specifications. Not doing so can have serious...

Read more

Ransomware: proactive protection in the cloud 
Ransomware: proactive protection in the cloud

The Orca Security and AWS guide outlines five key steps organizations can take to better protect against ransomware in the cloud. Businesses should use AWS Backup to create immutable backups of their most important cloud resources and run regular tests. Ransomware attacks are now also affecting cloud resources. However, the therefore indispensable ransomware prevention in the cloud is not only to detect malware, but also to continuously secure and harden the cloud environment. The aim is to prevent attackers from being able to reach their goal. Organizations must also ensure they use AWS Backup to...

Read more

Proactive data protection through SmartScan
Proactive data protection through SmartScan

CyberRes, a division of Micro Focus, announces a new version of Voltage File Analysis Suite (FAS), a cloud solution that combines the latest advances in data discovery and data protection. Included is the new SmartScan tool for intelligent sampling and dynamic tagging for petabyte-scale data discovery, enabling data analysts to more quickly identify areas of higher data risk. "CyberRes' new Voltage File Analysis Suite combines data detection and protection capabilities in a single solution - a critical advance in data security," said Reiner...

Read more

Lapsus$ is probably behind Uber-Hack
Lapsus$ is probably behind Uber-Hack

A few days ago, there was news that Uber was the victim of a major hack. There are even suspicions that the attackers have captured a vulnerability list from a bug bounty program. Uber, the travel service provider, has now confirmed that the attacker is the Lapsus$ group. Much was still unclear in the first report on the Uber hack. According to the driving service provider Uber, the processes can now be described and precisely defined which data was stolen. Here's what happened, according to Uber: “An Uber EXT contractor's account was compromised by an attacker using malware and their credentials were stolen. It…

Read more

Ransomware victim Caritas does not want to pay
Ransomware victim Caritas does not want to pay

Caritas welcomes its visitors with the headline “Caritas is the victim of a cyber attack”. A few days ago, large parts of the IT systems were encrypted by ransomware, data was stolen and a ransom was demanded. However, Caritas does not want to pay, but is pursuing other plans. Caritas has published a corresponding statement on its website, since it cannot be reached by email either: “The Caritas Association of the Archdiocese of Munich and Freising eV has been experiencing a major disruption in central IT systems since last weekend and, according to the current state of knowledge, is the victim of a far-reaching cyber attack become. The operation of the approx.

Read more

Vulnerabilities in remote iBoot power distributors
Vulnerabilities in remote iBoot power distributors

This could cause power failures remotely: Team82 discovers vulnerabilities in iBoot power distribution units. Almost a third of all Power Distribution Units (PDU) that can be controlled via the Internet are devices from iBoot manufacturer Dataprobe. They are also found in powered switches. Security researchers at Team82, the research arm of cyber-physical systems (CPS) security specialist Claroty, have disclosed multiple vulnerabilities in iBoot-PDU, Dataprobe's intelligent power distribution unit (PDU). The PDUs can be managed from any location via a web-based interface or a cloud-based platform. Matching code ensures shutdown By exploiting the vulnerabilities,…

Read more

Online training teaches threat hunting and SOC building skills
Online training teaches threat hunting and SOC building skills

The new online training program "Security Operations and Threat Hunting" for experts, developed by Kaspersky specialists, supports companies in optimizing their Security Operations Center (SOC) or even setting it up from scratch. It helps SOC and security teams optimize their threat hunting, incident detection and investigation capabilities. The course guides the participants through the SOC structure, threat intelligence and relevant attacks. The on-demand format and virtual hands-on exercises allow participants to complete the training at their own pace. Every company is familiar with SOC challenges: staff shortages and…

Read more