News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

15 years of Qakbot – a review
15 years of Qakbot – a review

Qakbot (aka QBot or Pinkslipbot) is a Trojan with a 15-year evolutionary history. From its origins as a banking Trojan, it continued to evolve into malware, which is now used for lateral distribution in a network and the deployment of ransomware. After being broken up by law enforcement authorities in August 2023, the 5th version of Qakbot was released a few months later. Zscaler analyzed the transformation of a resilient, persistent and innovative malware. Recently, the security researchers discovered that the threat actors have updated their code base to support 64-bit versions of Windows. In addition,…

Read more

Cyber ​​attack on healthcare platform in the USA
Cyber ​​attack on healthcare platform in the USA

A devastating cyber attack recently occurred on the US payment service Change Healthcare, which is part of the UnitedHealth Group. Many healthcare organizations have been cut off from the platform they rely on for patient claims submission and payment. While the outage does not appear to affect systems that provide direct, critical care to patients, it did expose a vulnerability that affects the entire U.S. healthcare system. The cyberattack on Change Healthcare reveals the risk of devastating ripple effects and widespread vulnerabilities across the healthcare industry. This attack shows the scope of…

Read more

Data: Reliable and accurate thanks to AI engine
Data: Reliable and accurate thanks to AI engine

Innovative AI-powered data observability features from a well-known provider ensure high quality of all externally collected data. This helps eliminate false positives and deliver trustworthy business analytics and reliable automation. Dynatrace announces new AI-powered data observability capabilities for its analytics and automation platform. Business analytics, data science, DevOps, SRE, security, and other teams can use Dynatrace Data Observability to ensure that all data on the Dynatrace platform is of high quality. Teams can track the provenance of external data Dynatrace Data Observability complements the platform's existing data cleansing and enrichment capabilities, which...

Read more

Shadow IT becomes Shadow AI
Shadow IT becomes Shadow AI

The path for users to AI is very short; entry is gentle, easy and often free of charge. And that has massive consequences in the form of shadow IT, which should be familiar to companies from the early stages of the cloud. The potential of generative AI has sparked a real gold rush that no one wants to miss. This is shown by a study by Censuswide on behalf of Cohesity, a global provider of AI-powered data management and security. 86 percent of 903 companies surveyed are already using generative AI technologies. Avoid loss of control In the past, public cloud services have sparked a gold rush in…

Read more

Secure access through Zero Trust SD-WAN
Secure access through Zero Trust SD-WAN

A leading cloud security provider has announced a new Zero Trust SASE solution built on Zero Trust SD-WAN. It connects all branches with each other and secures data traffic. The industry's first single-vendor SASE solution is powered by Zscaler Zero Trust AI and helps organizations reduce costs and complexity while implementing zero trust security for users, devices and workloads. In addition, Zscaler announces the availability of the Zero Trust SD-WAN solution and its plug-and-play appliances. This solution enables customers to provide secure connectivity for branches, factories and data centers while…

Read more

Hardware encrypted for compliance and security
Hardware encrypted for compliance and security

A specialist in hardware encrypted USB drives introduces the latest generation of the Sentry product line. The Sentry 5 series storage solutions comply with the new FIPS-140-3 Level 3 profile, a further development of the US security certification FIPS 140-2, which is also known in Europe. The requirements for physical security against manipulation and identity-based authentication have been increased again. For example, important security parameters are constantly checked during operation. Sentry 5 is already listed on the “Modules in Process List” of the US National Institute of Standards and Technology (NIST). Final certification is expected shortly (https://csrc.nist.gov/Projects/cryptographic-module-validation-program/modules-in-process/Modules-In-Process-List). Hardware-based…

Read more

More security for generative AI and LLMs
More security for generative AI and LLMs

Companies cannot afford to ignore generative AI and its potential. However, you need comprehensive AI observability to ensure investments in generative AI are successful and risks are avoided. Dynatrace has expanded its analytics and automation platform to include holistic observability and security for LLMs and generative AI-powered applications. Dynatrace AI Observability enables companies worldwide to use generative AI reliably and cost-effectively to increase their innovation, productivity and sales. Major platforms supported Dynatrace AI Observability is a comprehensive solution. It covers the end-to-end AI stack, including…

Read more

AI cost driver
AI cost driver

Companies are increasingly using artificial intelligence to optimize their operational efficiency and product innovation. A recent survey shows that 40 percent of companies surveyed want to increase their investments in AI technologies due to rapid advances in generative AI. However, a downside to its increasing use is that AI - particularly generative AI - is computationally intensive and costs increase with the amount of data on which the AI ​​models are trained. There are three main reasons why AI can quickly become a cost driver without proper control: AI consumes additional resources: Execution...

Read more

Autonomous cyber security strategy
Autonomous cyber security strategy

In order to successfully respond to the constant and rapid evolution of the threat landscape, companies will need to implement largely autonomous functions into their IT security strategy that can support cybersecurity systems in real time. With ongoing developments in artificial intelligence (AI), which enables hackers to carry out fast and precise attacks, companies must adopt similar technologies. This means you can always be one step ahead of the attackers. As the compliance landscape continues to evolve, organizations must recognize that a lack of preparedness could pose a serious threat to their success. The integration of an autonomous system will…

Read more

AI is revolutionizing access management
AI is revolutionizing access management

Many companies are currently considering using artificial intelligence (AI) for identity management. The technology not only allows users to monitor suspicious behavior more effectively and automatically, but also improves security systems. In the study “The State of Identity Governance 2024,” almost 53 percent of the 567 IT experts and executives surveyed said that functions supporting AI in identity and access management, for example, were among the top five priorities when evaluating such a solution. More and more IT administrators are coming to the conclusion that with many traditional IGA (Identity Governance and Administration) systems…

Read more