News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

EDR without NDR with weaknesses in protection
EDR without NDR with weaknesses in protection

The Swiss security company Exeon Analytics warns against only relying on conventional EDR solutions (Endpoint Detection & Response) when securing endpoints. Because the agent software does not always run at the end point, which creates weaknesses in the defense network. Many endpoints in modern, hybrid networks do not support the agents required for this, and where such agents are running, they can be undermined and deactivated by sophisticated attacks. Also, because of the trend towards working from home and BYOD (Bring Your Own Device), IT and security teams often don't have access to privately owned endpoints...

Read more

Cybersecurity solution for cloud, on-premise and hybrid storage systems
Cybersecurity solution for cloud, on-premise and hybrid storage systems

MetaDefender for Secure Storage protects cloud computing platforms and file storage solutions such as Amazon (AWS), Microsoft (Azure), Box, Google Drive, Cloudian and Dell EMC Isilon from cyber attacks and data loss. Storage solution providers, large and small, are increasingly offering hybrid solutions to their customers. Those who save both in the cloud and on-premise can also take advantage of the cloud and the stationary server. The latter gives you the feeling of having the security of the data in your own hands, while the availability of the cloud data whenever and wherever you want makes you incredibly flexible. Yet…

Read more

Lenovo notebooks, servers, desktops with BIOS vulnerabilities

ESET had already discovered dangerous UEFI security gaps in Lenovo notebooks in April. Lenovo itself is now reporting that it recommends installing new firmware for over 500 models, as there are sometimes highly dangerous security gaps. Lenovo has to lower the head again and report the presence of many security vulnerabilities in various BIOS versions of their devices. A few months ago, Lenovo had to patch the vulnerabilities that ESET had found in many UEFI BIOS versions. The currently published list of affected BIOS versions is again quite long. In addition to desktop PCs, notebooks, workstations, storage, servers, Lenovo lists…

Read more

Ransomware protection as a business solution
Ransomware protection as a business solution

More security for companies with the Avast product Ransomware Protection. Avast sees a 24 percent increase in ransomware attacks globally in Q2/2022 compared to the previous quarter. In addition to an additional layer of security, "ransomware protection" offers companies the opportunity to have uninterrupted access to their systems and data. Avast, a global leader in digital security and privacy solutions, is launching Ransomware Protection, a new business solution that offers more security against ransomware attacks. With this proactive feature, companies can protect their most important data, especially customer data, from unauthorized access. The new feature is…

Read more

Lorenz ransomware slips through VoIP phone vulnerability 
Lorenz ransomware slips through VoIP phone vulnerability

Arctic Wolf recently investigated a Lorenz ransomware attack that used a vulnerability in the Mitel MiVoice VoIP appliance (CVE-2022-29499) for first access and Microsoft's BitLocker Drive Encryption for data encryption. Users of the VoIO solution should urgently run the security patches. Lorenz is a ransomware group that has been active since February 2021 at the latest and, like many ransomware groups, exfiltrates data from its attack target before encrypting the systems. In the most recent quarter, the group primarily targeted small and medium-sized businesses in the United States, but organizations in China and Mexico were also hit. SMEs…

Read more

Ransomware Report: Extremely Widespread Attacks
Ransomware Report: Extremely Widespread Attacks

The new ransomware report from Barracuda shows: In addition to attacks on the classic industries, criminals are now increasingly targeting service providers, automotive, hospitality, media, retail, software and technology. Cloud security specialist Barracuda has released its fourth annual report on the evolution of ransomware threats. The current report covers attack patterns from August 2021 to July 2022. Since the attack on Ukraine began, the goal of many high-profile cyberattacks has shifted from purely financial gain for the attackers to causing as much disruption and damage as possible. The amount of…

Read more

Vulnerability Search: Hacking-as-a-Service for Enterprises
Vulnerability Search: Hacking-as-a-Service for Enterprises

Citadelo now offers penetration tests as "Hacking-as-a-Service" (HaaS). With the hacker subscription, the cyber security specialist wants to ensure more cyber security and IT stability in companies across Europe by detecting weak points several times a year. In Citadelo's experience, only a fraction of the organizations in the DACH region conduct security checks at all. And if so, then usually only once a year - often in the fourth quarter. "At Citadelo, we believe this approach is a methodological error," explains Mateo Meier, member of the Citadelo Executive Board. "Hackers try all year...

Read more

NetCloud with zero-trust security for 5G and SD-WAN  
NetCloud with zero-trust security for 5G and SD-WAN

Cradlepoint has announced NetCloud Exchange: a cloud-native solution built on policy-driven Zero Trust principles, delivering multiple SD-WAN and security services. The extension of the NetCloud management software enables companies with private or cloud-based data centers - thanks to more IT security - to increase the possibilities of their 5G installations, to offer new services and at the same time to digitally transform their business processes. Cloud computing and mobility The digital transformation of companies requires the increasing use of cloud computing and mobility as well as the Internet of Things. However, WAN architectures have proven to be too limited and inflexible to accommodate distributed enterprise locations, vehicles, devices...

Read more

New ransomware tactic: partial encryption
New ransomware tactic: partial encryption

There is a new trend in ransomware: In order to be faster and avoid detection, attackers rely on partial (intermittent) encryption of the files. As the SentinelLabs blog reports, security functions can also be outwitted in this way. A new danger! SentinelOne experts are observing a new trend in the ransomware scene – intermittent encryption or partial encryption of victims' files. This encryption method helps ransomware operators bypass detection systems and encrypt victims' files faster. Instead of encrypting an entire file, the process only takes place for all…

Read more

$10 million reward for Conti gang's "Fab Five".
$10 million reward for Conti gang's "Fab Five".

US is offering "up to $10 million" in rewards for information on the Conti gang and for capturing the "Fab Five" behind Conti. Behind the name Conti is a well-known ransomware gang - more precisely a so-called ransomware-as-a-service (RaaS) gang. In the RaaS criminal business model, the part of ransomware code creation, extortion, and taking extortion payments from desperate victims is handled by a core group, while the attacks themselves are carried out by a loosely assembled “team” of members. And these are usually not chosen for their malware-programming skills, but…

Read more