News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Immutable storage for maximum data security
Immutable storage for maximum data security

Today, data security and the security of the digital infrastructure are crucial for the success of a company. Companies are generating new data at astronomical speeds. Data has long since become a digital currency - and its value is increasing every day. Immutable Storage ensures more data security. Thus, protection against security threats and other data loss is of paramount importance for the IT security and administration teams. Data consistency and authenticity must be assured as organizations grapple with industry and government compliance mandates and other SLAs. But data protection from external attackers and malware also plays a role...

Read more

Forensic tool cracks Windows Hello PIN codes
Forensic tool cracks Windows Hello PIN codes

ElcomSoft cracks Windows Hello PIN codes with its forensics tool and attacks the LUKS2 encryption. This extends the range of forensic password recovery tools to include support for Windows Hello PIN codes on TPM-less computers. There is also support for the new LUKS2 specification for encrypted disks and containers in Linux. Microsoft implements PIN codes as part of Windows Hello authentication and recommends using PIN codes instead of a password. By default, PIN codes contain only digits, but alphanumeric PINs are also possible. While 4- to 6-digit PINs can be cracked in minutes, attacking an alphanumeric PIN…

Read more

Busted: Myths about Zero Trust
Busted: Myths about Zero Trust

In recent years, Zero Trust has become a buzzword for businesses. This often includes on-premises and cloud applications, a hybrid workforce, and a growing set of identities. Time to dispel some myths. It is this new world, in which IT environments and users are increasingly distributed, that is driving the adoption of Zero Trust. Instead of the “castle and moat” approach, where devices are trusted within the network, the model is based on the idea that users and devices should never be trusted by default. However, around Zero Trust there is…

Read more

E-Book: SOC Modernization and the Role of XDR
E-Book: SOC Modernization and the Role of XDR

About 98 percent of IT and security professionals dealing with cybersecurity technologies and processes are familiar with Extended Detection and Response (XDR). But: many define XDR and its functions completely differently. Many IT professionals also have different opinions about the usefulness of XDR: more than 20 different priorities and results were mentioned by at least 15% of the respondents. And with 80% of the companies surveyed already using more than 10 data sources as part of security measures, it might come as a surprise that they want to use even more data sources along with better detection rules….

Read more

Evil PLC attack: New attack technique against industrial plants

Claroty's Team82 security researchers discover new attack techniques against industrial plants: Evil PLC attack. PLCs – programmable logic controllers – or programmable logic controllers (PLCs) can trigger engineering workstations to run malicious code to manipulate processes or run ransomware. Programmable logic controllers (PLCs) are essential industrial devices that regulate manufacturing processes in all critical infrastructure areas. This makes them an interesting target for cybercriminals and state-sponsored attackers, such as the Stuxnet attack on Iran's nuclear program. Security researchers at Team82, the research arm of cyber-physical systems (CPS) security specialist Claroty, have now been able to prove that industrial control systems are not…

Read more

Cloud Native Protection including up to 1 million US dollars in the event of damage 
Cloud Native Protection including up to 1 million US dollars in the event of damage

Aqua is the only vendor guaranteed to stop cloud-native attacks in production; In the event of a proven successful attack, up to $1 million will be paid out. Aqua Security, the market leader and specialist in cloud native security, has introduced the industry's first and only cloud native security guarantee. Customers who have fully implemented Aqua's Cloud Native Application Protection Platform (CNAPP) following best practices and still fall victim to a cloud native attack will be awarded up to $1 million in damages. Here, cloud-native attack refers to unauthorized access by a third party to…

Read more

Modern vulnerability management in IT and OT
Modern vulnerability management in IT and OT

The measurement and improvement of IT security has now arrived at many companies and is being pushed forward. The question of OT security, on the other hand, is still a closed book for many companies. OTORIO explains how IT and OT security can be promoted equally and what role vulnerability management and scoring play in this. What are the most efficient risk reduction measures that achieve the most effective risk reduction for a specific facility, process or an entire production facility? However, once the risk reduction measures are implemented and an acceptable residual risk remains, there is still more work to be done. The reason for this is,…

Read more

Multidimensional DDoS and traffic analysis in real time
Multidimensional DDoS and traffic analysis in real time

NETSCOUT, a leading provider of cybersecurity, service assurance and business analytics solutions, has introduced Arbor Insight, a new technology that, combined with Arbor Sightline, will dramatically improve threat detection, service delivery and network operator visibility in the evolving threat landscape improved and expanded. DDoS attack volumes continue to exceed pre-pandemic levels, and the threat surface to defend against is expanding. Network operators of all sizes therefore need full, multi-dimensional visibility into the traffic flowing over their networks in order to optimize their countermeasures. The new combined solution package from Sightline and Insight…

Read more

DeathStalker targets forex and cryptocurrency market

APT actor DeathStalker is targeting companies in the forex and cryptocurrency market. The evasive tech and stealth "VileRAT" toolset is distributed via spear phishing. Companies in Germany are also affected by the attacks. Threat actor DeathStalker has updated its tech and stealth evasion “VileRAT” toolset to attack cryptocurrency and currency exchange businesses, recent Kaspersky analysis shows. The attacked organizations are located in Bulgaria, Cyprus, Germany, Kuwait, Malta, United Arab Emirates, Russia and the Grenadines. Hack-for-Hire APT Actor DeathStalker is a hack-for-hire APT actor whose activities Kaspersky has been tracking since 2018. So far he had...

Read more

Report: Growing threats from unencrypted devices
Report: Growing threats from unencrypted devices

Unencrypted devices can put any organization's security strategy at serious risk. This often-overlooked vulnerability allows attackers to penetrate the environment. A recent report by Absolute Software shows that 16 percent of endpoints are unencrypted, showing the problem is a bigger threat than one might think. A single vulnerable, lost, stolen, or compromised endpoint is enough to cause an incident. 16 percent unencrypted devices When an unencrypted device is connected to a corporate network in an office environment, the risk of a security incident is reduced. In the world of…

Read more