News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Outlook: Calendar entry can steal password
Outlook: Calendar entry can steal password -AI

There is a new vulnerability in Outlook and three ways to access NTLM v2 hashed passwords. Access can be done through the calendar function and double headers via calendar entry. Experts have discovered the vulnerability and are warning about it. Varonis Threat Labs discovered the new Outlook vulnerability (CVE-2023-35636) and three new ways to exploit it. This allows you to access the NTLM v2 hash passwords from Outlook, Windows Performance Analyzer (WPA) and Windows File Explorer. With access to these passwords, attackers can attempt an offline brute force attack or an authentication relay attack to compromise an account and gain access. Unpatched…

Read more

Cloud security: Half of all attacks start in the cloud
Cloud security: Half of all attacks start in the cloud

The results of a large-scale study show that cloud security clearly needs to be improved. Cloud attacks cost businesses an average of $4,1 million. But the Cloud Security Index: “Redefine Cloud Security with Zero Trust Segmentation” shows even more. Illumio presents its new Cloud Security Index: “Redefine Cloud Security with Zero Trust Segmentation”. The global study provides information on the current state of cloud security, the impact of attacks on the cloud, and the reasons why traditional cloud security technologies fail to protect businesses in the cloud. Vanson Bourne, an independent research firm, surveyed 1.600 IT and…

Read more

AI: a central factor in companies in 2024
AI will be a key factor for companies in 2024

According to a study, 82 percent of CTOs and CIOs of large companies worldwide consider AI to be crucial for defending against cyber threats. Only 38 percent of teams already use AI in all areas. Many fear that AI could write the code for vulnerabilities. Companies are increasing their investments in AI across all business areas to increase productivity, automate tasks, reduce costs and remain competitive, according to the latest study “The state of AI 2024: Challenges to adoption and key strategies for organizational success” by Dynatrace. Companies need to…

Read more

Attacks on SSH servers through SSH tunneling
Attacks on SSH servers through SSH tunneling

A pioneer in cloud native security has shed light on a long-standing but little-known threat to SSH servers. SSH tunneling allows threat actors to use SSH servers as a slave proxy and route traffic through them. Several months of research by Aqua's Nautilus research team revealed that cybercriminals have found a way to use SSH tunneling to create proxy pools. The cybercriminals primarily aimed at spreading SPAM, but evidence of information theft or cryptomining was also found. As part of the investigation, Team Nautilus found numerous indications that compromised…

Read more

Cybersecurity incidents: Lack of budget is a risk factor
Cybersecurity incidents: Lack of budget is a risk factor

According to a survey, 18 percent of cybersecurity incidents are due to a lack of cybersecurity budget. The manufacturing sector is the most frequently affected by incidents in Europe. Eight out of ten companies in Germany have suffered at least one cybersecurity incident in the past two years. The current Kaspersky study shows that a not insignificant part (18 percent) of this can be attributed to a lack of investment in cybersecurity. The majority (79 percent) of those surveyed in Germany believe that their current budget is sufficient to keep up with new cyber threats or...

Read more

Data: Prevent criminal exfiltration
Data: Prevent criminal exfiltration the easy way

CrowdStrike's AI-powered Falcon XDR platform eliminates the need for traditional data loss prevention (DLP) products. It protects end devices and prevents exfiltration and loss of data. Many organizations struggle with traditional DLP solutions that are difficult to implement and manage and cannot comprehensively monitor data in the modern cloud and AI era. The result is risky implementations that only work in audit mode and cannot prevent data theft. CrowdStrike Falcon Data Protection leverages the industry-leading visibility and protection of the CrowdStrike Falcon platform to protect critical data from insider threats and attackers and...

Read more

EDR: Automatically detect and process anomalies
EDR: Automatically detect and process anomalies

The new extension of the ESET security solution for EDR significantly minimizes the response time when detecting and processing cyber incidents. This relieves the burden on those responsible for IT. The IT security manufacturer ESET has released its security solution for Endpoint Detection and Response (EDR) with an expanded range of functions as well as improved automated detection and processing of anomalies. ESET Inspect also includes the new “Incident Creator”, which significantly reduces the response time and time required for administrators to record and resolve incidents. In this way, ESET is responding to the desire of many companies to use the advantages of EDR solutions even with limited IT resources...

Read more

IT Predictions 2024: Double-Edged Sword Generative AI

Generative AI opens up new possibilities that cyber specialists have been waiting for a long time. However, artificial intelligence is not just a blessing. Because it also opens up new opportunities for attackers and will also create additional vulnerabilities. A comment. Cybersecurity is a top priority for many companies. In this era of technological change, Generative AI is redefining the fundamentals and manifesting itself as a critical response to the ever-increasing complexity and sophistication of cyber threats. Thorben Jändling, Principal Solutions Architect, explains why generative AI in cybersecurity will remain a double-edged sword in 2024…

Read more

Cyber ​​defense: stronger through collaboration
Cyber ​​defense: stronger through collaboration

Greater data security and better cyber defense: The provider Commvault has now integrated various other security solution providers into its cloud platform. Commvault has announced partnerships to integrate its solutions with data security and intelligence offerings from pioneering cybersecurity, artificial intelligence and cloud companies. The recently announced Commvault Cloud now includes offerings from Avira, Darktrace, Databrick, Entrust, Netskope, Palo Alto Networks and Trellix, among others. Greater data transparency through partnership Industry leaders from the areas mentioned are integrating their offerings with the new Commvault cloud platform. So you and Commvault can work together in the future...

Read more

With AI-based NDR against ransomware
With AI-based NDR against ransomware

Ransomware threats are constantly increasing and evolving. AI-supported NDR (Network Detection and Response) systems can keep up better and therefore offer more protection. According to the Swiss security company Exeon Analytics, with the emergence of the Akira ransomware, large companies in particular and those tied to Kritis or NIS 2 are facing a new danger, as there is currently no decryptor for the current versions of the malware and the new group is mainly focuses on victims from whom it can extort large ransoms. According to Erismann, many SIEM systems (Security Information and Event Management) offer...

Read more