News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Does your current IT security concept work?

Automated cybersecurity checks make IT security that is becoming more complex more understandable. Large companies afford expensive tests of their IT security concept - what about less well-equipped medium-sized and small companies? In IT security, a kind of rabbit-hedgehog race has been taking place between well-organized cyber criminals and their possible victims for years. Highly sensitive targets of attack on IT infrastructures such as those of financial institutions, authorities, health facilities, energy suppliers, telecommunications service providers but also large companies have long been a lucrative target of hackers. All companies are one goal - including SMEs Due to their relevance for customers or the public and the large extent of damage in ...

Read more

Over 50 percent: Security incidents in DevOps environments 
Over 50 percent: Security incidents in DevOps environments

A Forrester survey shows that centralizing secrets and using unified tools is key to securing DevOps innovation. 57 percent of companies have suffered security incidents with disclosed secrets in DevOps. ThycoticCentrify, a leading provider of cloud identity security solutions, born from the merger of two market leaders in Privileged Access Management (PAM), Thycotic and Centrify, commissioned a survey from Forrester to examine the paradox of security innovation in DevOps environments. The study shows that more than half of companies have had security incidents related to ...

Read more

Log4j alarm: this is what F-Secure says about the security gap
Log4j Log4shell

A vulnerability in the Log4J library, which was discovered on Friday, December 10th, rocked software manufacturers and service providers around the world. The weak point in the standardized method for processing log messages in software from Microsoft's Minecraft to e-commerce platforms is already being attacked by attackers. It is almost impossible to describe the extent of the risk that currently exists in vulnerable applications. If a user-controlled string that targets the vulnerability is logged, the vulnerability can be run remotely. In simple terms, an attacker can use this vulnerability ...

Read more

Log4j alarm: Bitdefender Labs with first Log4Shell balance
Log4j Log4shell

The experts at Bitdefender Labs report an initial assessment of Log4j and Log4Shell: Hackers are intensively looking for vulnerabilities. A Tor concealment of the accesses to real endpoints makes Germany the seemingly number one country of origin of the attacks. Bitdefender counted 36.000 hits on honeypots in seven days. The Log4Shell vulnerability has been actively exploited by Apache as CVE-9-2021 since it was disclosed on December 2021, 44228. The results are amazing. Most of the attack attempts seem to come from western industrialized countries such as Germany, the USA and the Netherlands, but apparently some of them hide their origin behind exit nodes of the Tor network. That puts ...

Read more

Kaspersky offers new malware analysis training

Study: Trend towards IT security outsourcing shows a lack of IT security expertise in companies. IT security experts can acquire the highly sought-after specialist knowledge in this area via a new Kaspersky training course on Advanced Malware Analysis Techniques. The annual Kaspersky report "IT Security Economics" confirms a growing trend towards outsourcing IT security services because many companies no longer have the required expertise themselves. In the companies surveyed in Europe, this is currently cited as the main reason by 44 percent of small and medium-sized companies with up to 999 employees and every second large company. IT security experts can now use the highly sought-after specialist knowledge...

Read more

92 percent of IT decision-makers make compromises when it comes to cybersecurity
92 percent of IT decision-makers make compromises when it comes to cybersecurity

A high willingness to compromise contradicts the fact that cybercrime is seen as the greatest security risk by a third of those surveyed. Trend Micro study: 92 percent of IT decision-makers compromise on cybersecurity. Trend Micro, one of the world's leading providers of cybersecurity solutions, published a new study today, according to which 92 percent of IT decision-makers in Germany (90 percent worldwide) state that their company is compromising in favor of digital transformation, productivity or other business goals cybersecurity. Cybercrime is the greatest security risk According to the study by the Japanese security provider, only half in Germany trust ...

Read more

Log4j alarm: what Sophos recommends
Log4j Log4shell

Java vulnerability Log4j - Log4Shell - What happened and what should be done now. After Hafnium, Kaseya or Solarwinds, companies urgently need to grapple with a high-profile server vulnerability called Log4j - Log4Shell. Sophos clarifies the most important facts and tells you what to do. The name Log4Shell refers to the fact that the exploited bug is contained in a popular Java code library called Log4j (Logging for Java), and to the fact that if attackers successfully exploit the vulnerability, they practically get a shell - that is, the opportunity , any system code of your choice ...

Read more

Log4j alarm: this is what Kaspersky recommends 
Log4j Log4shell

A new, particularly critical vulnerability was discovered in the Apache Log4j library last week. This is used for millions of Java applications. Here are a few recommendations from the Kaspersky experts. Log4Shell - also known as LogJam and under the designation CVE-2021-44228 - is a so-called Remote Code Execution (RCE) class vulnerability. This allows attackers to execute arbitrary code and possibly gain full control over a system if it is exploited on a vulnerable server. The CVE was rated 10 out of 10 for severity. Log4j in millions of Java applications The Apache ...

Read more

Centralized platform for threat intelligence management
Centralized platform for threat intelligence management

To support security and response teams in companies in the detection, investigation and combating of threats and to increase the efficiency of IT security processes, Kaspersky has turned its threat intelligence fusion and analysis tool, Kaspersky CyberTrace, into a central threat intelligence -Platform expanded. The Kaspersky CyberTrace solution now includes enhanced threat intelligence platform functions. This includes, among other things, an alert triage, the analysis of threat data and the investigation of incidents. The paid version can be integrated with all common SIEM (Security Information and Event Management) solutions and security controls and offers a graphic visualization for an efficient reaction. The community version of ...

Read more

Managed storage - data protection rethought
Managed storage - data protection rethought

Secondary storage IT has to face three challenges: Complexity, durability and security. Three concerns, one solution: Managed Storage - a perfect interplay of hardware, software and service. The great complexity in companies as well as in the IT infrastructure runs counter to data backup. The amount of data, different data types and different authorizations keep the complexity growing and present IT officers with the challenge of having to secure all systems equally and in the long term against attacks. Initial situation The complexity is also carried over to the service life. Which system has which lifespan? How can we ensure no ...

Read more