News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

EU financial company attacked with EvilNum malware
EU financial company attacked with EvilNum malware

Proofpoint's threat research team has observed that the hacker group, dubbed TA4563 by the company, is using the EvilNum malware to attack various European financial and investment firms. EvilNum is a backdoor used to steal data or download additional malware payloads can be used. The most recently observed campaigns by the group exclusively targeted companies from the decentralized finance sector (Decentralized Finance: DeFi). Previously, however, organizations involved in the foreign exchange business or trading in cryptocurrencies also came into the crosshairs of the attackers. DeathStalker or EvilNum at Work As part of its investigations, Proofpoint was able to…

Read more

Security platform: protection of identities
Security platform: protection of identities

At its CyberArk Impact 2022 security conference, CyberArk unveiled several innovations that take identity protection to a new level. The extensions relate to privileged access management, identity management, cloud security and secrets management - and thus support companies in the implementation of zero trust strategies. Companies face major challenges. On the one hand, they must minimize the security threats associated with increasing cloud use and adoption of SaaS and the resulting increase in the number of identities. On the other hand, defensive measures need to be strengthened in order to be able to face increasingly sophisticated attack scenarios...

Read more

The Metaverse demands a new level of cyber and data security
The Metaverse demands a new level of cyber and data security

Even if the topic “Metaverse or Metaversum” is still acknowledged with a shrug of the shoulders in many places, especially in Europe, its development is picking up speed, especially in the USA. The Metaverse requires an evolution in cybersecurity. The well-known tech giants in particular are investing billions to turn the trend concept into a (virtual) reality. In addition to many opportunities, this new space also brings with it quite a few challenges ... one of which is cyber and data security. Cyber ​​attacks are also a reality in the Metaverse The Metaverse is a new reality and a platform that offers both opportunities and…

Read more

Log4j: Mittelstand continues high risk
Log4j Log4shell

The majority of medium-sized companies have not yet got to the bottom of the Log4j or Log4Shell problem. Only 40 percent have addressed the problem. Tenable warns that medium-sized companies still have an immensely large attack surface. As reported by the General Association of the German Insurance Industry (GDV), only 40 percent of medium-sized companies have checked their software to see whether it is affected by the Log4j vulnerability. Even fewer companies (28 percent) stated that they had checked their systems for intruded malware as a result of the vulnerability becoming known in December 2021. "As Log4Shell (CVE-2021-44228) over six...

Read more

Infostealer malware DUCKTAIL targets businesses
Infostealer malware DUCKTAIL targets businesses

WithSecure - formerly F-Secure Business - has detected a new infostealer malware: DUCKTAIL. The malware is delivered via LinkedIn spear phishing and then targets Facebook business accounts. DUCKTAIL targets professionals via LinkedIn spear phishing campaigns to hijack business Facebook accounts. Security researchers from WithSecure™ (formerly F-Secure Business) have discovered an attack campaign dubbed DUCKTAIL targeting individuals and businesses with a Business or Ads account on Facebook. The campaign consists of a malware component that enables information theft and hijacking of Facebook Business. Based on analysis and data collected, WithSecure™ has found that…

Read more

Open source tool "Chain-Bench" for more security
Open source tool "Chain-Bench" for more security

Aqua Security Partners with Center for Internet Security to Introduce First Guide to Security in the Software Supply Chain; Chain-Bench is the first open-source tool to validate the software supply chain to ensure compliance with these new CIS guidelines Aqua Security, the leader in cloud native security, and the Center for Internet Security (CIS), today released the industry's first formal guidelines for software supply chain security. CIS is an independent, non-profit organization dedicated to creating more trust in the connected world. The CIS software…

Read more

37 security products in the laboratory test
37 security products in the laboratory test

Security expert AV-TEST tested 18 security products for companies under Windows 10 and 19 protection packages for single PCs for Windows 10. AV-TEST specifies May and June 2022 as the test period. Products that have passed the test receive a safety certificate. The products tested by the AV-TEST Institute were tested in the laboratory by AV-TEST in May and June 2022. For each of the three test areas "Protection", "System load" (Performance) and "Usability" (Usability) the laboratory awards 6 points. With 18 points, a product has achieved the maximum rating. Company products under test Each individual program had to have…

Read more

MDR with improved attack detection and mitigation

Bitdefender's new managed detection and response service MDR Foundations promises improved detection and mitigation of attacks through 24×7 monitoring and proactive threat hunting by experts. Bitdefender is expanding its Managed Detection and Response (MDR) offering with the new MDR Foundations service. The new service, which can be booked on a monthly basis and is customizable according to user needs, offers guided and fully managed detection and mitigation of attacks by human security experts. Thanks to the offering, Managed Security Providers (MSPs), Value Added Resellers (VADs) and their customers, who only have limited internal resources and skills, can monitor and defend against threats around the clock. Smart…

Read more

Solution for automatic DDoS attack mitigation
Solution for automatic DDoS attack mitigation

NETSCOUT announces a new solution for smarter and automated DDoS attack mitigation. An innovative approach uses global visibility and AI analytics to quickly respond to DDoS attacks and reduce operational overhead. NETSCOUT, a leading provider of cyber security, service assurance and business analytics solutions, announces the launch of a new Artificial Intelligence (AI) based solution. This allows customers to automatically and instantly block most DDoS attacks, simplifying operations and minimizing risk to their business. ATLAS Network with DDoS Monitor The solution leverages NETSCOUT's ATLAS network, an unmatched source for insight into DDOS attack activity...

Read more

New Apple security feature: lockdown mode 

Apple has announced a new protection mechanism for particularly exposed users. Lockdown Mode promises a high level of security for specific users who, because of their person or work, may be personally targeted by sophisticated digital threats. The NSO Group (Pegasus Spyware) and other private companies involved in the development of government-sponsored spyware often undetected threaten a small target group of important or high-level users. Therefore, Apple offers a new security mode: Enabling lockdown mode in iOS 16, iPadOS 16 and macOS Ventura further strengthens device defenses and restricts…

Read more