News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Defense best practices
Defense best practices

A cybersecurity company that illuminates, examines and remediates internal and external risks released the results of its second report on trends in external cyber defense, highlighting the new risks facing organizations outside the traditional IT environment. “As enterprise attack surfaces continue to expand, cyber threat actors are adapting their strategies to exploit new vulnerabilities,” said Joel Molinoff, Global Head of Supply Chain Defense at BlueVoyant. “BlueVoyant conducted this research to shed light on the attack vectors that organizations need to be aware of and provide recommendations for action to combat the latest threats.”…

Read more

Cyber ​​Resilience Act before passage
Cyber ​​Resilience Act before passage

The European Commission's Cyber ​​Resilience Act, the most comprehensive law regulating product cyber security in Europe, will soon come into force. A number of changes have recently been made that specify the scope of the law. The formal adoption is considered safe in expert circles. “From our security analysis point of view, the specification of the Cyber ​​Resilience Act is very welcome, especially the even further extended level of security for end users. The device classes have been newly recorded: Article 6 introduced two additional cybersecurity risk classes for critical hardware and software products whose core functions are...

Read more

Cyber ​​attacks cost over 5 million euros annually
Cyber ​​attacks cost over 5 million euros annually

Cyber ​​attacks are increasing. Last year, 71 percent of German companies fell victim to ransomware. 59 percent paid ransoms. 53 percent fear more hacker attacks through generative AI technologies. Barracuda Networks has released its Cybernomics 101 Report, which analyzes the financial impact and profit motives behind cyberattacks. The research found that for German companies, the average annual cost of responding to attacks is around 5,7 million euros ($6,2 million). Ransomware attacks on over 70% of German companies The report also raises alarm as hackers explore how to use generative AI technology (GenAI)...

Read more

Wireless security for OT and IoT environments
Wireless security for OT and IoT environments

Wireless devices are becoming more and more common. This increases the number of access points through which attackers can penetrate networks. A new wireless multi-spectrum sensor can provide greater security. Nozomi Networks introduces Guardian Air, the industry's only wireless spectrum sensor designed specifically for OT and IoT environments. With 80 percent of new IoT deployments, wireless connections are quickly becoming the preferred network type. The explosion of wirelessly connected devices increases the number of potential access points and likely misuse of networks. This puts critical infrastructures at risk of cyberattacks and business interruptions...

Read more

Professional cybersecurity for SMEs
Professional cybersecurity for SMEs

Managed detection and response (MDR) for SMEs 24/7, 365 days a year. The IT security manufacturer ESET has expanded its offering with a new service. The new “ESET MDR” service now also offers medium-sized businesses threat monitoring, detection and tracking of threats, incident response and modern detection and response functions around the clock (24/7). The company is thus responding to the increased demand, which was fueled not least by the requirements of the state of the art. ESET MDR is now available from ESET specialist dealers in Germany, Austria and Switzerland. Professional, for…

Read more

Prevent malicious software from starting
Prevent malicious software from starting

A cyber protection provider has added a new feature to its security platform. It improves cybersecurity by preventing malicious or unwanted applications from launching on end devices. Malwarebytes, a global leader in real-time cyber protection, is launching Application Block, a new, free feature for users of its ThreatDown platform. The feature creates an additional layer of security that prevents unwanted or malicious applications from launching on the protected end devices. Less attack surface - more endpoint security This reduces the attack surface of the devices and often already busy IT teams are relieved. The function can be easily activated via…

Read more

Pikabot: camouflage and deceive
Pikabot: camouflage and deceive

Pikabot is a sophisticated and modular backdoor Trojan that first appeared in early 2023. Its most notable feature lies in its loader's ability to deliver payloads combined with advanced defensive evasion techniques. Using a command and control server, the attacker can take control remotely and execute various commands, including injecting shellcode, DLLs or executable files. The authors of Pikabot have also implemented several anti-analysis techniques to prevent automatic analysis in sandbox and research environments. This includes anti-debugger and anti-VM techniques as well as sandbox environment detection methods. In terms of its campaigns, Pikabot is similar to…

Read more

Ransomware-resistant WORM archives for data backup 
Ransomware-resistant WORM archives for data backup

A data archive is a must for every company. Few people know: An active WORM archive can help to streamline data backup, save costs and prepare for future requirements. It is also resistant to ransomware thanks to insurmountable hardware sealing! In many films, officers are sent to the archives as punishment after making mistakes. Dark rooms with hallways full of files that almost no one except the archivist ever sees. Often, however, the archive and the all-knowing archivist save the hero in the end because this is the only place where crucial information can be found...

Read more

Danger of election manipulation through cyber attacks
Danger of election manipulation through cyber attacks

Cyber ​​attackers are attempting to influence elections around the world using generative AI technology. The latest findings from the Global Threat Report 2024 show that more and more attackers are using stolen credentials to exploit gaps in cloud environments while further increasing their stealth, speed and impact. The report also sheds light on the top threats in 2024, including the manipulation of elections around the world and the use of generative AI, which lowers the barrier to entry and enables more sophisticated attacks. In the tenth edition of the cybersecurity leader's annual report, CrowdStrike highlights the…

Read more

Detect and defend against threats
Detect and defend against threats

In today's digitalized business landscape, combating threats requires a continuous, proactive and holistic approach. Open Extended Detection and Response (Open XDR) is a security technology that meets these criteria because XDR goes beyond just threat detection to coordinate defensive responses across a range of security tools. In the case of Open XDR, this happens regardless of the type, origin or provider of the tools. Below we'll explore XDR's end-to-end threat response capabilities to demonstrate what XDR can do for an organization's security posture...

Read more