News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Enhanced protection for Amazon Web Services (AWS) customers
Bitdefender technologies support the AWS service Amazon GuardDuty for advanced threat detection, helping to detect malware, zero-day attacks, malicious activity and other cybersecurity threats.

Bitdefender technologies support the AWS service Amazon GuardDuty for advanced threat detection, helping to detect malware, zero-day attacks, malicious activity and other cybersecurity threats. Bitdefender today announced that its antimalware technologies now support Amazon GuardDuty. Amazon GuardDuty is a threat detection service that monitors malicious activity and anomalous behavior to protect Amazon Web Services (AWS) accounts, workloads, and data. Better Protection for AWS Customers Bitdefender's antimalware technology offers AWS customers an advanced threat detection capability, identifying known and unknown malware, zero-day attacks and malicious activity. If…

Read more

Cloud threat hunting service against cloud-based attacks
Cloud threat hunting service against cloud-based attacks

CrowdStrike introduces the industry's first cloud threat hunting service to stop advanced cloud-based attacks. Falcon OverWatch Cloud Threat Hunting gives organizations access to an elite team of threat hunters to prevent incidents in cloud environments. CrowdStrike, a leading provider of cloud-based endpoint, workload, identity and data protection, today introduced Falcon OverWatch Cloud Threat Hunting. It is the industry's first standalone threat hunting service for hidden and advanced threats that originate, operate or exist in cloud environments. Armed with the industry's first cloud-centric attack indicators (Indicators of...

Read more

Cyber ​​risk: Companies struggle to assess themselves
Cyber ​​risk: Companies struggle to assess themselves

A new study by Trend Micro finds that 54 percent of organizations worldwide are dissatisfied with the maturity of their cyber risk assessment capabilities. This is accompanied by an increased risk of becoming a victim of ransomware, phishing and other threats. Respondents also indicate that complex technical systems and a lack of managerial awareness exacerbate the problem. 32 percent of German IT and business decision makers surveyed by Trend Micro say they have difficulty assessing risk when managing their digital attack surface. As a result, 87 percent of respondents feel at risk of phishing attacks...

Read more

Teslas as a dangerous data source?
Teslas as a dangerous data source?

Tesla's Model 3 have a so-called Sentry Mode. Cameras record the surroundings, film processes and determine the position. Tesla collects all data in a Dutch headquarters and stores it there. Is this a dangerous data source if Tesla's properties are recording secret services or military areas? The data stored by Tesla on the Model 3 is certainly interesting for data thieves, as many Teslas film in sentry mode and note the position. Even the Munich police are said to have used the data in one case to arrest a con artist. Many official…

Read more

NDR push by analyzing metadata 
NDR push by analyzing metadata

With the analysis of metadata instead of the usual Deep Packet Inspection (DPI), the Swiss cybersecurity company Exeon Analytics is establishing a modernized and future-proof Network Detection & Response (NDR) solution in the European market. In contrast to the established methods based on DPI, the metadata analysis is not affected by encrypted data traffic. This is relevant as modern cyber attacks such as APTs, ransomware and lateral movements rely heavily on encrypted communication for attack instructions from remote command and control servers (C&C). Encrypted metadata catches the eye Traditional NDR solutions typically detect such processes using comprehensive data analysis,…

Read more

Sophos X-Ops combines Labs, SecOps and AI
Sophos X-Ops brings together SophosLabs, Sophos SecOps and Sophos AI

Concentrated threat intelligence: Sophos announces Sophos X-Ops. Sophos X-Ops combines SophosLabs, Sophos SecOps and Sophos AI under one roof. Combination of three established Sophos cybersecurity expert teams helps companies to protect themselves even more effectively against cyber attacks. Sophos announces Sophos X-Ops, a new cross-functional unit of SophosLabs, Sophos SecOps and Sophos AI. The three established cybersecurity expert teams are being combined so that companies can be defended even more effectively against constantly changing and increasingly complex cyberattacks. Sophos X-Ops brings together the predictive, real-world, and deeply researched threat intelligence of all teams to collectively create stronger and more innovative protection, detection, and...

Read more

With crypto algorithms against bad bots
With crypto algorithms against bad bots

Radware has added a new set of crypto mitigation algorithms to its Bot Manager. Inspired by blockchain methods, the algorithms help close security loopholes that allow sophisticated bots to bypass traditional CAPTCHA solutions and harm a website or application. At the same time, they allow real visitors to use the website without CAPTCHAs. "The problem of bad bots is getting bigger and bigger for companies big and small," says Dr. David Aviv, Radware's Chief Technology Officer. “Malicious bots are used for everything from stealing concert tickets to blocking inventory to…

Read more

New zero-day vulnerabilities are attacked after 15 minutes 
New zero-day vulnerabilities are attacked after 15 minutes

Administrators only have a short window of 15 minutes to 10 hours after the notification of new zero-day vulnerabilities to provide their systems with security updates, a study shows. Attackers are getting faster and faster when it comes to exploiting new zero-day vulnerabilities. This is shown by a study by Palo Alto Networks, for which around 600 security incidents were analyzed. On average, it takes only 15 minutes after a new zero-day security vulnerability is reported for criminals to actively search the Internet for vulnerable systems. So have some of the hardest zero-day vulnerabilities of the past year, including…

Read more

After the first cyber incident, the next one often threatens 
After the first cyber incident, the next one often threatens

Companies that have been the victims of a cyber attack should definitely revise their security strategy because the risk of the hackers striking again within a year is high, as the Data Breaches Survey Report for 2022 shows. Cybersecurity company Cymulate has released its 2022 Data Breaches Survey Report. It is a global survey of 858 senior decision-makers from around the world and from a variety of industries including technology, banking, finance and government. The results make you sit up and take notice and should prompt those responsible in companies to take action. Above…

Read more

Remote Browser for Zero Trust Approach

Most attacks on businesses come through email or through browser content and downloads. Ericom Remote Browser Isolation (RBI) funnels websites through a cloud instance, removing unnecessary code and making browsing safer. Downloads are also checked or isolated in the cloud before delivery. The browser is the world's most used application. Active content ensures a high level of convenience and supports users in automatically triggering a wide variety of processes. However, the shift to the browser brings with it new security risks: Verizon states in the Data Breach Investigations Report that the number of cyber attacks…

Read more