News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Kaspersky offers enhanced Threat Intelligence Portal
Kaspersky offers enhanced Threat Intelligence Portal

The new version of Kaspersky Threat Intelligence (TI) brings together all of the cybersecurity expert's TI services, TI sources and cyberattack intelligence capabilities into a single, convenient interface. The updated portal supports real-time search across various TI resources, including the Kaspersky databases, the dark web, and the surface web. The new functions also include the visualization of investigations and advanced analysis options for complex malicious objects. Insights into the threat landscape Threat intelligence provides comprehensive insights into the threat landscape and enables companies to anticipate risks; it has become one of the most developing and in demand…

Read more

Russian cyber attacks on Ukraine KRITIS
Russian cyber attacks on Ukraine KRITIS

"Cyberattacks on critical infrastructure have become a key element of this conflict" - expert commentary on the Russian hacking attack on the largest private energy conglomerate by cybersecurity specialist Claroty. The DTEK Group, which owns coal and thermal power plants in various parts of Ukraine, says it has been the target of a Russian hacker attack. A group called XakNet wanted to destabilize the energy operator's technological processes, spread propaganda about the company's activities and leave Ukrainian consumers without electricity. Ukrainian electricity supplier attacked The same Russian hacker group allegedly attacked back in April…

Read more

DDoS attacks decrease - special attacks increase
DDoS attacks decrease - special attacks increase

According to the latest NETSCOUT Threat Intelligence Report, the number of DDoS attacks worldwide fell from 5,4 million in the first half of 2021 to 4,4 million in the second half of the year. While the total number of attacks also fell in Germany in the last half of the year, innovative and adaptive DDoS attacks continued to cause disruptions and network failures. “Cybercriminals brought a new focus by launching direct path attacks via botnets and TCP-based flood. A balance between reflection/amplification attacks and direct-path DDoS attacks has been observed for the first time. This is also evident in Germany, where TCP-based attacks are among the three most common…

Read more

Zero Day vulnerability in Google Chrome Browser
Zero Day vulnerability in Google Chrome Browser

As Tenable reports, a zero-day vulnerability has been found in Google's Chrome browser. Targeted attacks are expected, albeit more on people, such as journalists, in the Middle East. However, the weak points are by no means harmless. A comment by James Sebree, Senior Staff Research Engineer at Tenable. As early as 22.07.2022/XNUMX/XNUMX, several reports were published about a zero-day vulnerability in Google Chrome (and possibly Edge and Safari) that was exploited to attack journalists in the Middle East. Security company Avast linked the vulnerability to Candiru. Candiru has previously exploited previously unknown vulnerabilities,…

Read more

Pentest tools: powerful tools for real attackers
Pentest tools: powerful tools for real attackers

Pentest tools are actually supposed to be used by Red Teams to test attack surfaces, uncover security gaps and then close them. But these powerful testing tools can also be misused by cyber criminals. Unfortunately, they are often quickly overlooked by security. Unit 42, Palo Alto Networks' malware analysis team, is constantly on the lookout for new malware samples that match known Advanced Persistent Threat (APT) patterns and tactics. One such sample was recently uploaded to VirusTotal, where it received a positive verdict from all 56 vendors that examined it. In other words: nobody...

Read more

Study: vulnerable IoT in medicine, production and KRITIS
Study: vulnerable IoT in medicine, production and KRITIS

IoT Security Report 2022 uncovers significant gaps in cyber security. A study reveals many vulnerable IoT systems in the areas of medicine, production and KRITIS. Business leaders should think about increasing liability. Cyber ​​security is still thought of in silos - that is the conclusion of a study by the specialist for IoT security ONEKEY. “In many cases, companies and entrepreneurs still think in classic silos when it comes to IT security. The immediately growing risk of many different firmware versions in IoT systems is often overlooked,” warns Jan Wendenburg, Managing Director of ONEKEY. Highest IoT threat in medicine To the areas…

Read more

Good security and data protection functions drive 5G networks
Good security and data protection functions drive 5G networks

A new study by Trend Micro, one of the world's leading providers of cyber security solutions, shows that improved security and data protection functions are the main motive for the expansion of private 5G networks. The disclosure of data transmitted over the wireless network is considered the greatest security concern. More and more operators of networked production plants, hospitals or other "smart" infrastructures are looking for alternatives to public 5G networks and hope for better coverage and control, low latency times and a higher level of security through private 5G networks. However, such environments have a number of security requirements that traditional…

Read more

Cyber ​​Attackers Market RaaS: Ransomware-as-a-Service
Cyber ​​Attackers Market RaaS: Ransomware-as-a-Service

Behind many cyber attackers are not just loners in dark rooms. Rather, some APT groups see themselves as business companies that no longer act themselves, but only sell their services and technology and collect heavily. That makes money and reduces risk. Here is a brief explanation of how RaaS – Ransomware as-a-Service works. In IT, products are now primarily offered as services, such as Platform-as-a-Service (PaaS) or Infrastructure-as-a-Service (IaaS). These consist of a large number of sub-services, which in turn are made available by different providers in terms of the division of labor and professionalization...

Read more

Combat identity-based attacks with Zero Trust
Combat identity-based attacks with Zero Trust

Identity-based threats have become a major source of attacks and data breaches. As a result, organizations today require improved identity awareness and new threat mitigation strategies, which is best achieved by implementing an identity-based Zero Trust approach. Below are the basics of how the Zero Trust model works and best practices for implementing it effectively. The Zero Trust model is a security approach based on the idea that organizations shouldn't automatically trust everyone inside or outside the infrastructure perimeter. Instead, every entity or user trying to access the system must verify themselves. What is…

Read more

Protect backups easily and effectively against ransomware
Protect backups easily and effectively against ransomware

Backups serve to protect against data loss. If an original is lost, you still have a copy to be on the safe side, as a “backup”. Backing up data could be that easy in a world free of ransomware and natural disasters. But nowadays IT managers have to think a lot more. FAST LTA shows you what a secure, reliable and affordable backup strategy looks like. Ransomware changes the focus of data protection from backup to recovery. Ransomware encrypts user data so that access is no longer possible. The result: IT stands still, which leads to high costs due to failure, recovery and the…

Read more