News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​warfare: critical infrastructure in the crosshairs
Cyber ​​warfare: critical infrastructure in the crosshairs

Not only the recent cyber attacks on critical infrastructures - energy, logistics, telecommunications - have shown how vulnerable many organizations and their infrastructures are. It becomes particularly critical when attacks affect both IT (information technology - PCs, servers, etc.) and OT (operating technology - machines, etc.). Daniel Bren, the CEO and co-founder of OTORIO, is a well-founded expert on the subject. As a former IT security chief of the Israeli army and today's entrepreneur, he knows many aspects of the problem: "In 1997, the US Department of Defense (DoD) conducted the first "cyber war games" under the operation "Eligible Receiver"...

Read more

The Firewall Metamorphosis: Infrastructures in the Cloud
The Firewall Metamorphosis: Infrastructures in the Cloud

More and more companies are moving resources and infrastructure to the cloud. In view of this development, conventional firewalls are reaching their limits. Hybrid work and network security must be combined: the firewall metamorphosis. A comment by Michael Veit, Technology Evangelist at Sophos. The current evolution of the modern workplace suggests that both traditional and cloud environments are merging into a world where hybrid security infrastructure use cases will dominate the future of network security. This is where SASE approaches can offer the highest level of flexibility for companies to interact on both sides of the spectrum and…

Read more

Double attack via vulnerable Exchange servers 
Double attack via vulnerable Exchange servers

SophosLabs is investigating the use of the Squirrelwaffle malware "distribution station" in combination with social engineering. There was a double attack: malware droppers and financial fraud ran through the same vulnerable Exchange Server. An incident guide for security teams at organizations impacted by Squirrelwaffle. In a recent article, the Sophos Rapid Response Team describes a case where Squirrelwaffle malware exploited a vulnerable Exchange server to distribute malicious spam through hijacked email threads. At the same time, an email thread was stolen by the attackers in order to trick unsuspecting users into transferring money. Combination of Squirrelwaffle, ProxyLogon and ProxyShell The…

Read more

More and more attacks on critical infrastructures
More and more attacks on critical infrastructures

The series of cyber attacks on critical infrastructures - KRITIS - does not seem to stop. At the beginning of February, a hack attack caught the Swiss company Swissport and disrupted flight operations in Switzerland, then the ransomware attack on the Oiltanking tank farm in Germany, attacks on SEA-Invest in Belgium and Evos in the Netherlands. Some expert comments. “Cyber ​​attackers often target their attacks where they can cause the most business disruption. This way, the victim might be more willing to pay ransom to get their systems back online. For this reason…

Read more

Cyber ​​security and digital forensics via artificial intelligence - AI 
Cyber ​​security and digital forensics via artificial intelligence - AI

Corporate and government compliance and risk management departments typically have many manual processes. In order to be able to keep up with the mountains of data and regulatory requirements, they are dependent on new technologies - above all with artificial intelligence - AI. Exterro, provider of legal GRC software that combines e-discovery, digital forensics, data protection and cybersecurity compliance, explains which solutions make the work of those responsible easier. Massive data protection violations, difficulties in adhering to compliance requirements after cyber attacks or uncovering serious crimes: the work of internal legal departments and investigative authorities has increased, but the human resources are not in the same...

Read more

Study: Too much trust in your own IT security - underestimate cyber risks

The majority of executives in Germany consider their company to be well positioned when it comes to IT security - despite costly security incidents in almost half of those surveyed. A study by Arctic Wolf. A recent study by Arctic Wolf, a leader in security operations, shows that seven out of ten (70%) German executives believe their companies are as secure or more secure than their European competitors when it comes to IT security. In addition, 84% have confidence in their employees' ability to detect a cyber attack. Despite this generally high level of trust in one's own cyber defence...

Read more

Mobile health devices: Kaspersky discovered 33 security vulnerabilities
Mobile health devices: Kaspersky discovered 33 security vulnerabilities

Kaspersky experts last year found 33 vulnerabilities in the most commonly used protocol for transmission of mobile health devices used for remote patient monitoring. Qualcomm Snapdragon also affected. 18 vulnerabilities are critical vulnerabilities. That's 10 more than in 2020, many of them still unresolved. Some of these vulnerabilities allow attackers to intercept data being sent online from the device. Increase in vulnerabilities in 2021 The ongoing pandemic has led to rapid digitization of the healthcare sector. There…

Read more

Growth: Crowdsourced security with bug bounty platform
B2B Cyber ​​Security ShortNews

Crowdsourced security prevails: YesWeHack bug bounty platform continues on the road to success. In 2021, the platform more than doubled its annual sales worldwide. The YesWeHack community of ethical hackers has grown by 75 percent globally, with over 35.000 ethical hackers now active on the platform. The past 2021 months marked another record year for vulnerabilities. In 35, YesWeHack saw twice the number of vulnerabilities identified by its hackers compared to the previous year. XNUMX percent of these were classified as "critical" or "high". This means that many enterprise systems and applications would have been seriously impacted if…

Read more

Varonis: Improved Microsoft 365 protection for more effective ransomware detection 
Varonis: Improved Microsoft 365 protection for more effective ransomware detection

Varonis brings new capabilities to reduce data exposure to Microsoft 365. New version reduces Microsoft 365 explosion radius, enables more effective ransomware detection, and reduces collaboration risks. The new version 8.6 of the Varonis data security platform improves data security when using Microsoft 365 with clear tools for identifying at-risk files and folders with access rights that are too broad, new threat models for defending against ransomware and automatic labeling of sensitive files. New version of data security platform The Varonis data security platform puts data at the center of protection measures, thereby helping companies…

Read more

Vulnerability Intelligence module enables CVE prioritization
Vulnerability Intelligence module enables CVE prioritization

SearchLight with new Vulnerability Intelligence module. Monitoring solution from threat intelligence provider Digital Shadows enables CVEs to be prioritized for faster triage and mitigation. Cyber ​​threat intelligence provider Digital Shadows has added a new vulnerability analysis capability to its SearchLightTM solution. The Vulnerability Intelligence module enables security teams to identify relevant CVEs (Common Vulnerabilities and Exposures) more quickly and effectively prevent exploits. SOCs: Identify Relevant CVEs Faster The module in SearchLight is based on nine years of intensive research and analysis by Digital Shadows' forensic threat intelligence team. The analysts continuously monitor criminal forums, collect…

Read more