News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Old protocols are cyber risks in the network
Benchmarking report on cyber risks in the network

An ExtraHop Cyber ​​Risk and Readiness Benchmarking report reveals the proliferation and risk of internet-exposed protocols on corporate networks. More than 60% of companies expose the remote control protocol SSH to the public Internet and 36% of companies use the insecure FTP protocol. ExtraHop, the leading provider of cloud-native network intelligence, today released the results of the ExtraHop Benchmarking Cyber ​​Risk and Readiness Report showing that a significant percentage of organizations are exposing insecure or highly sensitive protocols such as SMB, SSH and Telnet to the public Internet. Whether intentional or accidental, these vulnerabilities widen the attack surface of any organization...

Read more

Agentless malware prevention solution for cloud storage 
Agentless malware prevention solution for cloud storage

Deep Instinct launches an advanced malware prevention solution. Agentless malware prevention based on deep learning for cloud storage and web applications stops the attacker earlier to protect the financial industry and other large enterprises from an undersecure attack point Deep Instinct, the first company to bring end-to-end deep learning to the applies cybersecurity today unveiled its Deep Instinct Prevention for Applications solution. It is an agentless, on-demand enterprise anti-malware solution that works independently of devices and operating systems. This new offering revolutionizes threat protection across...

Read more

New cybersecurity platform for cyber-physical systems CPS
New cybersecurity platform for cyber-physical systems CPS

Claroty introduces its new cybersecurity platform for. xDome strengthens resilience, enables modernization and improves the reliability of cyber-physical systems and provides more protection in the enhanced Internet of Things (XIoT). Claroty, specialist for the security of cyber-physical systems (CPS) in industry, healthcare facilities and companies, is now bringing companies a significant increase in resilience in the operational and cyber areas with its new cloud-based cyber security platform xDome. An industry first, Claroty xDome offers the simplicity and scalability of SaaS without sacrificing the breadth and depth of visibility, protection and...

Read more

IT threat situation in Germany
IT threat situation in Germany

The IT threat situation in Germany and the world is intensifying. Tetra Defense, an Arctic Wolf company, collects and analyzes IT security data every quarter and uses it to assess the current IT threat situation and develop countermeasures. The results from Q1 2022 (January - March). In order to know how companies can most effectively protect themselves against cyber attacks, they need to know how attackers gain access to systems. An attacker's initial entry point is called the Root Point of Compromise (RPOC). There are three distinct categories: Knowing where the attack is coming from...

Read more

BSI ranks Sophos as a Qualified APT Response Provider
SophosNews

After an intensive examination, the Federal Office for Information Security (BSI) included Sophos in its list of qualified service providers in the APT area. The official list of the BSI makes it easier for operators of critical infrastructures to select suitable companies in the field of IT forensic services. After an extensive review process, Sophos is now on the list of qualified APT (Advanced Persistent Threat, or APT) response service providers for KRITIS companies. This overview supports operators of critical infrastructures in identifying suitable service companies that are able to uncover camouflaged cyber attacks that attack a network or system over a longer period of time without much research effort...

Read more

Complete server protection with Sophos Cloud Native Security
Complete server protection with Sophos Cloud Native Security

The new security solution with comprehensive protection coverage Sophos Cloud Native Security protects all servers in companies - from on-premises to multi-cloud, from Windows to Linux and offers full integration with Sophos Central. With Sophos Cloud Native Security, Sophos has introduced a solution that offers comprehensive security coverage across cloud environments, functions, services and identities. Sophos Cloud Native Security bundles the two products Sophos Intercept X Advanced for servers with XDR and Sophos Cloud Optix Advanced. It supports companies in securing cloud environments and offers high transparency, central administration...

Read more

New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co
New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co

The use of macros to spread malware has declined significantly: by as much as 2021 percent between October 2022 and June 66. However, attackers are beginning to use tricks to circumvent the protection. Commonly, cyber criminals use VBA macros to automatically execute malicious content if a user has macros enabled in Office applications. XL4 macros, on the other hand, are specific to the Excel application, but can also be used by attackers as a tool for spreading malware. The masterminds behind macro-based attacks typically use social engineering to convince the recipient…

Read more

0ktapus phishing campaign: 130 victims like Cloudflare or MailChimp  
0ktapus phishing campaign: 130 victims like Cloudflare or MailChimp

Group-IB has discovered that the recently uncovered 0ktapus phishing campaign targeting Twilio and Cloudflare employees was part of the massive attack chain that resulted in 9.931.000 accounts from over 130 organizations being compromised. The campaign was codenamed 0ktapus by researchers at Group-IB because it posed as a popular identity and access management service. The vast majority of victims are located in the United States, and many of them use Okta's identity and access management services. Group-IB Threat Intelligence teamdiscovered and analyzed the attackers' phishing infrastructure, including phishing domains, the phishing kit, and the...

Read more

Revised Neurons platform creates a better overview
Revised Neurons platform creates a better overview

Ivanti, the provider of the Ivanti Neurons automation platform that discovers, manages, secures, and maintains IT assets from the cloud to the edge, introduces Ivanti Neurons for Digital Experience. This enables IT teams to better understand, measure and optimize the digital employee experience (DEX). With this innovation, Ivanti continues its mission to enable and secure the Everywhere Workplace by combining IT Service Management (ITSM), Unified Endpoint Management (UEM) and Cybersecurity. This gives IT teams a 360-degree view of their entire IT landscape. Ivanti Neurons for Digital Experience proactively measures and optimizes the experiences employees...

Read more

CNAPP capabilities for container security and cloud vulnerabilities 
CNAPP capabilities for container security and cloud vulnerabilities

CrowdStrike extends CNAPP capabilities to secure containers and help developers quickly identify and remediate cloud vulnerabilities. The extension of agent-based and agentless protection adds support for Amazon ECS and enables DevSecOps teams to develop in AWS environments even more securely. CrowdStrike, a leading provider of cloud-based protection for endpoints, workloads, identity and data, announced powerful new capabilities of the Cloud Native Application Protection Platform (CNAPP). Thanks to the new features, CrowdStrike Cloud Security now also offers support for Amazon Elastic Container Services (ECS) within AWS Fargate, extends image registry scanning to include...

Read more