News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Data protection: New digital obligations for companies

Since the beginning of 2022, companies have had to request and submit numerous documents digitally. This poses new challenges for operational data protection, since the GDPR must also be observed. Since this year, companies have had to request numerous documents from their employees as digital documents, for which paper form was previously sufficient. The Hamburg-based data service provider TeamDrive points out that this is all personal information that must be stored in accordance with the General Data Protection Regulation (GDPR). On the one hand, this includes employee documents such as membership certificates, notifications or other notifications from the health insurance company or...

Read more

More targeted cyberattacks on Ukraine
More targeted cyberattacks on Ukraine

During the Russian invasion, another malicious program, IsaacWiper, appeared after HermeticWiper. They are aimed directly at Ukrainian organizations. In addition, attacks are carried out with the malware HermeticWizard for distribution in the local network and HermeticRansom as decoy ransomware. In the wake of the Russian invasion of Ukraine, ESET researchers have discovered new wiper malware families used in targeted cyber attacks on Ukrainian organizations. The first cyberattack started a few hours before the Russian invasion with massive DDoS attacks against major Ukrainian websites. In the course of these attacks, some of the new type of malware was also…

Read more

Ransomware group Conti dismantles itself in dispute 
Ransomware group Conti dismantles itself in dispute

According to experts, Conti has already extorted 2,5 billion dollars with ransomware in recent years. Now it is clear: the group is based in Russia and has internally backed the Russian war of aggression. However, some Ukrainians or opponents of the war probably worked in the group and did not agree with it. Now chats and codes have been leaked and, according to experts, also the crown jewels - the source code. It was probably no coincidence that the data with 60.000 internal chats of the Conti group was leaked to a Ukrainian security researcher. According to the first statements, in the…

Read more

Danger situation 2021 for mobile devices

New Kaspersky study shows the state of the mobile threat landscape in 2021. Attackers focus on bank and gaming account credentials. Users in Germany rank sixth among the countries most frequently affected by banking Trojans. Over the past year, Kaspersky has seen a decline in attacks targeting mobile devices, while cybercriminals have focused their efforts on higher-risk – and therefore more profitable – avenues of attack against smartphone and tablet users. The challenge here are new, increasingly complex malicious programs that break new ground, for example to obtain access data and sensitive information from banking, gaming or other...

Read more

Defense-in-depth approach for enhanced cyber security 
Defense-in-depth approach for enhanced cyber security

Classic security measures such as multi-factor authentication or anti-virus programs are not sufficient for comprehensive cyber security. Companies must therefore pursue a defense-in-depth approach and focus primarily on securing identities and privileged access, says security expert CyberArk. In most attacks, regardless of who is behind them, the identity layer is the first point of entry into an organization's network. In many cases, it has been shown that attackers are able to maintain persistent, undetected and long-term access in compromised environments by using legitimate credentials, among other things. MFA,…

Read more

Forecast: VPN retires - SASE is coming
Forecast: VPN retires - SASE is coming

How will hybrid work continue? Palo Alto Networks predicts the end of VPN and the establishment of SASE - Secure Access Service Edge. With the security framework, security and network connectivity technologies are converged into a single cloud-delivered platform. In 2022, after nearly two years of remote work, millions of knowledge workers will adjust to a new rhythm and routinely work from both home and the office. This transition from pure remote work to hybrid work offers companies the opportunity to create a stable foundation for their employees...

Read more

SaaS platform with Distributed Cloud Services
SaaS platform with Distributed Cloud Services

F5 has launched the new F5 Distributed Cloud Services. They offer security, multi-cloud networking and edge-based solutions on a unified Software-as-a-Service (SaaS) platform. F5 also presents the first new solution for the platform: F5 Distributed Cloud WAAP (Web Application and API Protection). It includes multiple security capabilities across F5 technologies in one SaaS offering. Enterprises are increasingly using complex application portfolios and multi-cloud implementations. For example, F2022's upcoming 5 State of Application Strategy Report shows that 88 percent of companies are running both legacy and modern application architectures. 70 percent also use multiple clouds. This…

Read more

Report: Compliance and Security Risks in Open Source Software

The number of compliance violations and security vulnerabilities in open source software is increasing: Audit teams discover a total of 230.000 critical cases. Revenera Status Report 2022 on Software Supply Chain & Open Source Software (OSS). Revenera, provider of solutions for software monetization, open source compliance and installation, has published the new "State of the Software Supply Chain Report". Data from over 100 audits was analyzed to understand the volume of undocumented open source software (OSS) in companies and to identify potential compliance and security risks. Up to 2.200 critical cases per audit For the cross-industry study, Revenera evaluated more than 2,6…

Read more

Neurons platform with risk-based patch management
ivanti news

Ivanti, the automation platform, introduces new integrated solutions: Ivanti Neurons for Patch Management, Ivanti Neurons Digital Assistant, and Ivanti Neurons for Healing enhancements with automatic ticket classification. The new and expanded products support companies in realizing and securing the "Everywhere Workplace". Ivanti Neurons is a hyper-automation platform. It leverages artificial intelligence and machine learning to meet the growing demands of IT and security teams. Against the background of increasing remote and hybrid work, they are confronted with completely new challenges. Ivanti Neurons independently repairs and secures devices, providing end users with personalized self-service experiences. Included…

Read more

Global Threat Report shows rise in ransomware
Global Threat Report shows rise in ransomware

New CrowdStrike Global Threats Report Shows Rise in Ransomware and Disruptive Operations. The report shows that attackers are using “lock-and-leak” operations and cloud service providers are increasingly being targeted by Russia-affiliated cyber actors. CrowdStrike Holdings, Inc., a leading provider of cloud-based protection for endpoints, workloads, identity and data, announces the release of the 2022 CrowdStrike Global Threat Report. Among other things, the report not only reveals an 82 percent increase in ransomware-related data leaks, but also introduces two completely new groups of nation-state attackers, WOLF (Turkey) and OCELOT (Colombia). In addition, the experts add to the list…

Read more