News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyberattacks: 3 out of 5 employees consider their company a lucrative target
Cyberattacks: 3 out of 5 employees consider their company a lucrative target. Image: depositphotos

According to a study, three out of five German employees consider their company a lucrative target for cyberattacks due to sensitive data. This fact can be useful in raising employee awareness. The majority of German employees (almost 62 percent) believe that cybercriminals specifically target their company because they process a lot of critical data, such as customer information. This is a finding of the representative study "Cybersecurity in Numbers" by G DATA CyberDefense, Statista, and Brand eins. Fundamentally, every company is an interesting target for attack – regardless of design plans or other...

Read more

Access sharing: Platform for secure third-party access
Access sharing: Platform for secure third-party access - Image: depositphotos

The new Fudo ShareAccess platform solution connects companies securely and quickly with external service providers and partners – without the need for traditional VPNs or complex configurations. And: without compromising IT security. Unlike previous solutions on the cybersecurity market, Fudo ShareAccess is the first solution specifically designed to provide third-party access instantly via a central, browser-based interface. Companies can integrate external partners in minutes. This allows companies to retain full control and transparency while ensuring compliance. Browser-based access solution "This isn't just another...

Read more

FunkSec: Analysis of AI-powered ransomware
FunkSec: Analysis of AI-powered ransomware Image: depositphotos

Kaspersky presents its latest research on the FunkSec ransomware group. It is an example of what the future of mass cybercrime could look like: AI-powered, multifunctional, highly adaptable, and volume-oriented, with ransom demands starting as low as $10.000 to maximize profits. FunkSec, active since late 2024, has already targeted the government, technology, financial, and education sectors in Europe and Asia. The ransomware is characterized by a sophisticated technical architecture and AI-assisted development. It combines comprehensive encryption with aggressive data exfiltration in a single, Rust-based executable. This can do more…

Read more

New SD-WAN gateway with BSI security certificate
New SD-WAN gateway with BSI security certificate Image: depositphtos

The new SD-WAN gateway LANCOM 1930EF has received a security certificate from the BSI (Federal Office for Information Security) in accordance with the "BSZ" certification process. This provides companies with an excellent device for their site networking of medium-sized and large enterprises. The German network infrastructure and security supplier LANCOM Systems has received a security certificate in accordance with the "BSZ" certification process for its SD-WAN gateway LANCOM 1930EF. With the "Accelerated Security Certification" (BSZ), the Federal Office for Information Security (BSI) addresses, among other things, manufacturers of network components, as these are of paramount importance for defending against IT and cybersecurity risks. The LANCOM 1930EF gateway was certified with software version LCOS 10.80.0742…

Read more

Software supply chain attacks in industry
Software supply chain attacks in industry

German industry is also increasingly confronted with software supply chain cyberattacks on smart systems, so-called embedded systems. These are attacks that are deliberately introduced via external components, software libraries, or firmware updates. This is pointed out by the Düsseldorf-based cybersecurity company ONEKEY, which operates a platform for automated testing of software in embedded systems for malicious code or vulnerabilities under the name Product Cybersecurity & Compliance Platform (OCP). This form of cybercrime exploits security gaps at suppliers, service providers, or software providers to attack companies downstream in the supply chain or even the end customer. Industrial plants, machine control systems (OT systems, etc.) are particularly affected.

Read more

Research in the Darknet: AI as investigator in forums
Research in the Darknet: AI as investigator in forums Image: depositphotos

In a joint international research project, Sophos, the Université de Montréal, and the company Flare used artificial intelligence (AI) to identify key players in the digital underworld. This turns AI into a tireless investigator in darknet forums. Sophos experts are incorporating this researched methodology and the results from the international research project into their ongoing threat analysis. The project was based on a mix of methods from IT security, data science, and criminology. Systematically identifying key players: Criminal internet forums offer extensive insights into threats and vulnerabilities. The Sophos Counter Threat Unit (CTU) team already manually evaluates such sources. The goal of the…

Read more

Attacks on SMEs: Fake ChatGPT delivers malware instead of help
Attacks on SMEs: Fake ChatGPT delivers malware instead of help Image: depositphotos

Attacks on SMEs are on the rise: Between January and April 8.500, 2025 SME employees were deceived with fake services such as ChatGPT, Teams, or Zoom, resulting in a significant amount of malware being distributed under the guise of free help. Cybercriminals are increasingly disguising malicious or unwanted software as popular productivity applications, as a recent Kaspersky study shows. A total of around 2025 SME employees were targeted by such malware in the first four months of 8.500. Attacks disguised as ChatGPT (115 percent increase), Microsoft Teams (100 percent), and Zoom (13 percent) increased significantly. In addition, employees…

Read more

Companies see rapid AI progress as a top security risk
Companies see rapid AI progress as a top security risk Image: depositphotos

The 2025 Data Threat Report shows that 74 percent of German companies see rapid AI advances as the top security risk associated with GenAI. Furthermore, malware has remained the dominant attack type since 2021; phishing rises to second place, and ransomware falls to third. The findings of the Thales Data Threat Report 2025 show that the focus is on the transformative impact of AI, with GenAI receiving particular emphasis. These tools rely heavily on high-quality, sensitive data for functions such as training, inference, and content generation. With the rise of agent-based AI, this will become even more…

Read more

The European Vulnerability Database (EUVD) is online
The European Vulnerability Database (EUVD) is online

The European Union has launched the European Union Vulnerability Database. This central database lists known vulnerabilities and provides recommendations for remediation, thus primarily strengthening the cybersecurity of critical infrastructure companies, IT service providers, and European software vendors. Vulnerability databases play a crucial role in security operations. They serve as central repositories for known security gaps and provide standardized information that companies can use to specifically secure their systems. By using uniform formats for describing vulnerabilities, they enable efficient and consistent information exchange – across organizational and national borders. Their function is particularly important in risk prioritization:…

Read more

Agentic AI: Danger from autonomous AI-based cyberattacks
Agentic AI: Danger from autonomous AI-based cyberattacks

Agentic AI is capable of autonomously executing cyberattacks from start to finish. These autonomous, self-learning AI systems can plan, execute, and adapt attacks in real time without human intervention. This illustrates how dramatically the threat potential is changing with the use of AI—in speed, scope, and sophistication. The speed at which AI technologies are evolving is expanding the capabilities of attackers—and security providers—every day. Agentic AI is entering a new chapter: These systems operate persistently, adaptively, and with an efficiency that overwhelms conventional defense strategies. Unit 42 will be developing its new framework…

Read more