News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Vulkan files: Russia's cyber army collects vulnerabilities
Vulkan files: Russia's cyber army collects vulnerabilities

An evaluation of the Vulkan files by many media and journalists shows that Russia's secret services FSB, GRU and SWR commission domestic companies to develop software and databases for cyber attacks, to look for vulnerabilities and to make them available to state hacker groups such as Sandworm. The linchpin of the story are the Vulkan files, which were passed anonymously to the reporter Hannes Munzinger. Thousands of pages of secret material contain training documents for the Russian cyber army. The possible targets of attacks are summarized in these documents: paralyzing control systems of rail, air and ship transport, disrupting the functions of energy companies,...

Read more

BSI: IT security check of medical practices

The Health Situation Report 2022 from the BSI shows: The security situation in the network of the telematics infrastructure (TI) is very secure thanks to strict specifications. But what about IT security in medical practices? The BSI starts new research projects. The strict controls and specifications of the telematics infrastructure have ensured that the number of security incidents in this area is very low. The Health Situation Report 2022 from the BSI shows the structure and specifications of the telematics infrastructure. The security situation in the connected networks, such as that of the doctor's offices, has hardly been recorded, although it is essential for the...

Read more

Teamdrive with new version
Teamdrive with new version

The new version 5 of the cloud application TeamDrive is available for download. According to the manufacturer, TeamDrive 5 has over 50 new and improved functions. The most important innovations are: Introduction of a new group management for large teams, numerous functions to increase productivity, simplification of workflows in the company, a modernized user interface and a security concept that has been reinforced again. User feedback Most of the new and expanded functions are based on user feedback, emphasizes TeamDrive Managing Director Detlef Schmuck. He says: "Our product, technical and sales teams have listened carefully to our customers in order to improve the overall experience when using TeamDrive...

Read more

Report: IT leaders believe XDR is necessary
Report: IT leaders believe XDR is necessary

A new study underscores the uncertainty surrounding XDR definition, implementation and required resources. The ExtraHop report shows that 78 percent of the IT managers surveyed consider the topic of XDR to be necessary, despite irritation. ExtraHop has released the results of the study "To Achieve the Promise of XDR, Look Beyond the Endpoint" examining the adoption of Extended Detection and Response (XDR) in organizations. The global study highlights the successes, obstacles, challenges and hesitations of companies that have developed or are considering an XDR strategy. Despite the uncertainty, nearly a third of...

Read more

The risk situation is completely under control
The risk situation is completely under control

Centralized monitoring and automated threat prevention across all network security and endpoint security products: With ThreatSync, WatchGuard now offers a comprehensive XDR solution as part of the Unified Security Platform. WatchGuard Technologies is now adding value to its Unified Security Platform architecture with ThreatSync as an easy-to-use eXtended Detection and Response (XDR) solution. This centralizes monitoring and automated threat prevention across all network security and endpoint security products, providing a further boost to effectively deal with threats on the foundation of a comprehensive security platform. Comprehensive security platform The merging of event data from the firewall, the host sensor on the…

Read more

Password management to protect enterprise users
Password management to protect enterprise users

New and Enhanced Workforce Password Management Features: The cloud-based enterprise password management solution allows employees to securely collect, store and manage their passwords and other application credentials. The innovations offer administrators more flexibility and control to reduce risks and improve the security of web applications. In contrast to personal password managers, Workforce Password Management is designed for enterprise environments and meets the requirements of companies in terms of data protection, availability and IT security. This includes, among other things, the support of modern passwordless authentication and directory services. New function…

Read more

Proactive Incident Response for SaaS
Proactive Incident Response for SaaS

With the introduction of Proactive Incident Response, Varonis improves the data security of its customers. As part of the SaaS offering, a team of experienced analysts monitors suspicious activity on the customer side, investigates alerts and notifies security officers. With this new service, Varonis significantly reduces the pressure on security teams and improves their ability to prevent data breaches. In addition to providing tactical support in incident response, threat hunting, and alert prioritization, Varonis security experts also provide strategic advice, adapt threat models, and implement preventive actions to continuously improve customers' data security...

Read more

Spray and pray attacks against ManageEngine IT tools
Spray and pray attacks against ManageEngine IT tools

Since January 2023, cybercriminals have been targeting implementations of Zoho Corporation's ManageEngine software solutions worldwide with an opportunistic attack. Cyber ​​criminals use automated scans to tap into a large field of potential victims of ransomware or industrial espionage. Bitdefender Labs analyzed the first attacks in their telemetry. The new campaign is another example of the more common opportunistic, initially automated vulnerability scans by cybercriminals followed by hybrid targeted attacks. The aim of the attackers is to execute code remotely (Remote Code Execution – RCE) in order to play out additional payloads or to start industrial espionage....

Read more

Emotet handles Microsoft OneNote attachments
Emotet handles Microsoft OneNote attachments

Emotet breaks new ground again and infects Microsoft OneNote documents. The digital notebook, which is popular in companies, is therefore a danger for many users. In fact, since last summer, Microsoft rolled out its initiative to automatically block macros from downloaded documents. This has forced criminals to reconsider how they want to spread malware via spam. One notable change has been the use of Microsoft OneNote documents by several other criminal gangs. Now it's Emotet's turn to follow this strategy. Dangerous OneNote Documents OneNote file is simple yet effective at social engineering users with a…

Read more

Phishing attacks hit all-time high
Phishing attacks hit all-time high

More than 30 percent of businesses and consumers were exposed to mobile phishing attacks in each quarter of 2022. Heavily regulated industries such as banking and insurance were hit the hardest. Lookout has released its Global State of Mobile Phishing Report. According to the data, 2022 saw the highest percentage of mobile phishing attacks ever, with an average of more than 30 percent of businesses and consumers exposed to these attacks each quarter. Lookout also found that users across all devices, whether personal or work, received more mobile phishing links...

Read more