News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Targeted email attacks on energy and utilities sectors
Targeted email attacks on energy and utilities sector - Image by Sergio Cerrato - Italia on Pixabay

Successful attacks on energy and utility companies such as Colonial Pipeline or Ukrainian Energy Utilities show how far-reaching an attack can be. In many cases, the first steps of the attack take place via sophisticated email attacks. Energy and utility companies are increasingly using digital technologies to manage and integrate complex distributed operations and remote locations such as wind farms, power plants and grids. Successful attacks on energy and utility companies show how far-reaching their impact can be. One example is the May 2021 ransomware attack on Colonial Pipeline, the largest fuel pipeline in the United States. This resulted in a ransom payment of...

Read more

Report highlights cyber threats to automotive industry
Report reveals cyber threats to automotive industry

Cyber ​​Threats: The 2023 VicOne Automotive Cyberthreat Landscape Report identifies the supply chain as the primary target of increasing cyberattacks on the automotive industry. This also shows a list of cyber-based trends and incidents that have threatened the automotive industry. VicOne has unveiled its new Automotive Cyberthreat Landscape Report 2023. The comprehensive annual report on cyber threats across the automotive industry is based on data from automotive original equipment manufacturers (OEMs), suppliers and dealers worldwide and includes the following key points: Evidence of growing use and monetization of automotive data - and the associated risk of exploitation by cybercriminals A list…

Read more

Myths about data encryption
Myths about data encryption

Data encryption is slow, complex, resource-consuming and inconvenient in everyday life. These and other prejudices against data encryption do not correspond to the facts. The need to protect data for legal and compliance reasons is an accepted fact in the business world. Data protection officers and business strategists are aware that this necessity is becoming even more important not only in international business, but also due to distributed working environments and the rapidly increasing use of the cloud in all business areas. The most effective technology to address compliance requirements and cyber risks is to encrypt all sensitive data that the company sends towards...

Read more

Centralized vulnerability detection platform
Centralized Vulnerability Detection Platform - AI MS

Horizon IOC: Check Point integrates a new platform into its IT security architecture. This means there is now central management of vulnerability detection for Horizon XDR/XPR and Playblocks. The innovative platform fits seamlessly into the Horizon architecture and can be easily integrated into the Horizon XDR/XPR and Playblocks products. The latter fill Horizon IOC automatically after the integration. With their help, Indicators of Compromise (IOC) can be evaluated much more easily than before. Consolidating data into one point Horizon IOC merges data from various sources, including other Check Point products, SOC teams, and…

Read more

Encryption tools for Microsoft 365 Cloud
Encryption tools for Microsoft 365 Cloud - KI MS

More encryption options for data in the Microsoft 365 Cloud: eperi is expanding its eperi for Microsoft 365 product with additional useful tools with Microsoft 365 encryption for Planner and To Do to protect plan names, tasks and files from unauthorized access. For companies that use Microsoft 365, eperi now also offers functional encryption of Microsoft Planner and Microsoft To Do in the cloud. The new encryption options complement eperi's previous data protection-compliant encryption for Microsoft 365 core applications such as Exchange, SharePoint or OneDrive. With the new function, companies protect, for example…

Read more

Free online AI tool identifies social engineering  
Free AI online tool identifies social engineering - AI MS

Social engineering also threatens many employees in companies. The new Bitdefender chatbot service Scamio uses a powerful AI service to detect and verify online fraud attempts across email, text messages, messaging apps and social media. Bitdefender has introduced Scamio, a free service to detect attempted scams. The service is intended to help users verify fraudulent online offers via email, embedded links, text and instant messaging by working with a chatbot based on artificial intelligence. Detecting Social Engineering with Scamio The extent of online fraud continues to increase every year. A report from the Federal Trade Commission…

Read more

Mobile Security Index 2023: Phishing is trending
Mobile Security Index 2023: Phishing is trending - Image by Inamulhaq Usmani on Pixabay

The new 2023 Verizon Mobile Security Index highlights the importance of an effective mobile threat defense strategy. Published annually, the index confirms that phishing attacks on mobile devices are the main gateway to corporate data. As more and more employees work from anywhere, mobile devices dominate as the device of choice for the modern workforce. However, because these devices have traditionally been neglected as part of an organization's overall security strategy, they have also become the most vulnerable target for external hackers. Social engineering targets employees. Through tactics such as social engineering...

Read more

Automate compliance
Automate compliance

New laws and guidelines cause uncertainty in companies' IT departments - and also in management: The EU Commission's upcoming Cyber ​​Resilience Act (CRA) includes liability for board members and managers in companies. The German company Onekey has been researching cybersecurity vulnerabilities in smart products, such as IoT and OT devices, as well as practically all systems that are connected to the Internet, for years - and operates a Product Cybersecurity and Compliance Platform (in short: PCCP), which carries out automated testing and risk evaluation of device software. With the new integrated Compliance Wizard…

Read more

January 28, 2024: European Data Protection Day
January 28, 2024: European Data Protection Day - KI MS

January 28, 2024 is European Data Protection Day. In this context, it is important to raise awareness of privacy and data protection and to raise awareness of relevant IT security issues - regardless of whether they concern the private or corporate environment. Advances in artificial intelligence (AI) and machine learning (ML) are an obvious theme on Data Protection Day 2024 - both because of the potential benefits that such tools bring with them and because of the dangers that come with them, which are certainly cause for concern care for. According to Carla Roncato, Vice President of Identity, WatchGuard Technologies. AI…

Read more

Healthcare is a prime target for email attacks
Healthcare is a prime target for email attacks

In one survey, the healthcare industry experienced more email security breaches than average. The recovery costs following such attacks are particularly problematic for the healthcare system. Ransomware attacks on healthcare organizations have more than doubled since 2022, according to the latest Barracuda Ransomware Annual Report. However, when you look at healthcare in comparison to other industries, a more complex picture emerges, says Dr. Klaus Gheri, Vice President & General Manager Network Security at Barracuda Networks. In many cases, this sector experiences fewer major cyber incidents than other industries…

Read more