News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Without a forced break: Fast data migration to new systems
Without a forced break: Fast data migration to new systems

Data migration, i.e. moving data from an old system to a new one, is an important task in a company. Experience shows that data migration often takes a lot of time and is associated with a number of challenges. But it is also much faster, easier and safer! The average lifespan of IT hardware is five years. After this period, replacement is required, often due to performance limitations or security risks. Additionally, technological advances mean that companies need to update their data systems. Outdated systems pose a security risk. Migration…

Read more

Sharp increase in ransomware
Sharp increase in ransomware

A leading provider of an AI-powered, cloud-based cybersecurity platform has released its new cyberattack and ransomware statistics for Q1 2024. In the DACH region, general cyber attacks fell significantly compared to Q1 2023 (-17 percent). At the same time, however, the spread of ransomware in Europe increased the most of all regions year-on-year (64 percent). However, the most ransomware in absolute terms continues to occur in North America, where 59 percent of almost 1.000 ransomware attacks took place. By industry, communications companies saw the largest year-over-year increase in ransomware (177 percent), followed by manufacturing companies (96…

Read more

MDR: Advanced Managed Detection and Response service
MDR: Advanced Managed Detection and Response service ms-KI

Cybersecurity specialist Bitdefender has presented its further developed offering for managed detection and response services. Companies and organizations can now obtain two different levels of the service: MDR and MDR PLUS are tailored to the specific needs of customers depending on the industry and place of origin or taking into account other risk factors such as the respective supply chain. Bitdefender MDR continuously monitors, detects and responds to threats. In addition, the service offers active threat hunting. Security analysts guide customers with their advice and advise them on the risk situation. Centralized management of services from a single point…

Read more

Browser attack: Acceleration through graphics card as a point of attack
Browser attack: Acceleration through graphics card as a point of attack MS - AI

Browser attack: Using a website with malicious JavaScript, researchers from the Institute for Applied Information Processing and Communication Technology at Graz University of Technology were able to spy on information about data, keyboard entries and encryption keys on third-party computers in three different attacks via WebGPU. Modern websites place ever greater demands on the computing power of computers. Therefore, in addition to the CPU of a computer, web browsers have also been given access to the computing capacity of the graphics card (Graphics Processing Unit or GPU) for several years. The JavaScript scripting language can use the resources of the GPU via programming interfaces such as WebGL and the new WebGPU standard. However, this carries risks. Researchers carry out browser attack on Crome, Edge & Co. WebGPU is currently…

Read more

Trap: Fake Skype, Zoom and Google Meet websites

Some attackers use online meeting services as bait for malware. Researchers at Zscaler found fake Skype, Zoom and Google Meet websites that were used by threat actors to spread Remote Access Trojans - RAT for short. Zscaler's ThreatLabZ team warns about fake online meeting sites that distribute various malware families. Already at the beginning of December 2023, the researchers discovered a threat actor who creates fake Skype, Google Meet and Zoom websites to spread malware in order to spread remote access Trojans such as SpyNote RAT to Android users and NjRAT and DCRat to Windows users . This…

Read more

Increase in ransomware attacks and compliance failures
Increase in ransomware attacks and compliance failures

An annual report highlights the latest threats, trends and emerging topics in data security. It is based on a survey of almost 3.000 (262 in Germany) IT and security experts in 18 countries and 37 industries. This year's report found that 93% of IT professionals believe security threats are increasing in scope or severity, a significant increase from 47% last year. The number of companies affected by ransomware attacks increased by over 27% last year (32% in Germany). Despite this escalating threat, fewer...

Read more

Protect identities with intelligent authorization controls
Protect identities with intelligent authorization controls

The number of human and non-human identities in organizations is growing rapidly, and sooner or later each of these identities will need access to critical resources. This makes them extremely attractive to cybercriminals. The days when only a few administrators had extensive permissions in company IT infrastructures are long gone. Most employees, applications and devices now also require such rights in order to access critical resources that they need in their everyday work. The classic definition of privileged identities therefore no longer applies, because ultimately every identity can be privileged and requires…

Read more

New Exchange Online protection for companies
New Exchange Online protection for companies - Image by kirstyfields on Pixabay

The cyber defense specialist G DATA is launching a new solution for Exchange Online. G DATA 365 Mail Protection is designed to stop dangerous emails before they cause damage. The Mail Security Gateway is placed in front of the Microsoft Exchange Online mailboxes. G DATA 365 Mail Protection is intended to reliably protect companies and their employees from dangerous messages. The solution was developed specifically for the use of Exchange Online and relies on a self-developed anti-malware engine – for maximum protection. This means that malicious emails don’t even reach employees’ mailboxes and phishing...

Read more

After the LockBit blow: What about ransomware attacks?

In a current report, Trend Micro analyzes the ransomware landscape and provides an outlook on the impact the interruption of LockBit activities has on it. LockBit was not completely broken up, but its activity was severely suppressed and new malicious code developments were discovered and thus rendered unusable. In collaboration with the British National Crime Agency (NCA), Trend Micro was able to provide detailed analyzes of the ransomware group's activities and permanently disrupt the entire functionality of the malware. Since 2022, LockBit and BlackCat have consistently been among the Ransomware-as-a-Service (RaaS) providers with the most discoveries. Globally you can...

Read more

Impact of NIS2 on cybersecurity in healthcare
Impact of NIS2 on healthcare cybersecurity

The revision of the EU directive on increasing cybersecurity for critical infrastructures (NIS2) has brought the issue of cybersecurity even more into focus in many healthcare facilities. Because they are considered particularly worthy of protection. Confidentiality, integrity and availability of data are of central importance in the healthcare sector. This is where entire health processes and diagnoses, including therapy plans, are documented. Since every security breach carries the risk that medication plans will be manipulated or information will fall into the hands of third parties, cyber security is essential. The sensitive data is an extremely popular target for criminals, as was the case recently with the attack on...

Read more