News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

A dangerous situation requires a broader perspective
A dangerous situation requires a broader perspective

Four cyber security trends for 2022. The expanded threat situation requires a broader perspective: ransomware payments or resource theft for cryptomining, sabotage, espionage or vandalism. A comment by Thomas Krause, Regional Director DACH at ForeNova. At the end of 4, Log2021j once again made it clear how easy an attack can be for hackers. You only need to exploit existing and emerging vulnerabilities to gain widespread malicious control. The attackers may be pursuing well-known motives: quick money by paying ransoms or stealing resources for cryptomining, sabotage, espionage or vandalism. Nevertheless, new challenges arise for all those responsible for IT security. Four trends...

Read more

Cyber ​​security: German companies invest too little

Cyber ​​security: A quarter of German companies invest too little in preventing cyber security incidents. 82 percent of companies in Germany have already been victims of cyber attacks. A Kaspersky report shows that companies depend on partners. One in ten security incidents avoided is serious. However, the current Kaspersky report "Cybersecurity Cornerstones for Proactive Decision Makers" shows that 26 percent of decision makers in Germany (23 percent in Europe) do not invest enough in the prevention of cybersecurity incidents. With more than three in four respondents (82 percent; in Europe 79 percent) having been victims of cybercrime - the…

Read more

Privacy advocates will have a hard time in 2022
Privacy advocates will have a hard time in 2022

The widespread use of Microsoft in German companies poses a challenge for data protection officers. According to Detlef Schmuck: "Data protection is on fire in many German companies." Especially since the EU-US Privacy Shield was declared invalid two years ago. "The role of data protection officers in companies will become more difficult in the new year," says data security expert Detlef Schmuck, managing director of the German data service TeamDrive GmbH. Above all, the widespread use of software from the US provider Microsoft in the German economy is an increasing problem because it poses the risk that personal…

Read more

Secure e-mail transmission in the cloud is gaining in importance
Secure e-mail transmission in the cloud is gaining in importance

In 2021, email will be 50 years old. During this time, it has long established and proven itself as the main means of communication in everyday business. This will not change in 2022 either - on the contrary: by 2025, general email usage will increase rapidly. In view of the fact that many companies are currently moving their office and e-mail applications to the cloud, the importance of e-mail security is becoming more important again. Because hackers don’t stop at applications like Microsoft 365 either. With professional solutions, however, it is also possible here…

Read more

Hackers organize themselves more and more professionally
Hackers organize themselves more and more professionally

In the course of 2021, hackers have organized their underground ecosystems better and better, so that in the new year 2022 even more professional attack patterns must be expected. According to the security experts at Radware, ransomware groups in particular are increasingly looking for allies among experienced contract hackers. Attacks on MSPs and 5G network operators are also expected. For example, ransomware groups Avaddon, SunCrypt, Ragnar Locker, and Hello Kitty are known to use DDoS attacks to further pressure their victims. "Such groups regularly publish messages hiring experts in areas such as backup technology - not to...

Read more

Ransomware: Backup alone is not a security strategy
Ransomware: Backup alone is not a security strategy

Many companies think their data backup protects them against ransomware. The enticingly simple logic behind it: If you can restore all the data, you are not open to blackmail. By Ali Carl Gülerman, CEO and General Manager, Radar Cyber ​​Security. However, this is too short-sighted: Even if the system was successfully restored after an attack, sensitive information such as customer data or intellectual property could have been stolen. In addition, the risk of attack remains: Hackers can still be in the network or gain access again by installing a back door. In some cases, ransomware is used by cybercriminals as a red herring, ...

Read more

Container security also offers attack surfaces
Container security also offers attack surfaces

Risk awareness, classic cyber security principles and specific countermeasures increase the security of data and processes. IT managers use their own container security or those provided by cloud service providers in order to set up agile and flexible applications and operate processes. Ultimately, however, containers are also executable applications and can be dangerous. Container host servers and registries extend the attack surface. Classic principles of IT security and an increased sensitivity to threats help to close emerging gaps. Containers in the cloud or on-premise containers - whether kept privately or provided via a cloud provider - offer hackers ...

Read more

AI-based XDR platform against threats
AI-based XDR platform against threats

Google Cloud and Cybereason introduce first AI-based XDR platform that collects and analyzes threat data from across the IT environment on a global scale. The XDR company Cybereason and Google Cloud announce the availability of Cybereason XDR, powered by Google Chronicle. With the Extended Detection and Response solution (XDR), defenders are able to predict and detect cyberattacks in the company and react to them at maximum speed - whether at endpoints, in networks, identities, in the cloud or in individual work environments. Powered by Google Chronicle "Together, Cybereason and Google Cloud Deliver the ...

Read more

Security advisor against ransomware
Security advisor against ransomware

An improved security status reduces cyber risks, also with ransomware. Cohesity launches Security Advisor that scans the customer's Cohesity environment, including numerous security configurations. Cohesity, a leading provider of data management solutions, has launched Security Advisor. This extension of the threat defense architecture offers companies an easy way to improve their security posture in the face of sophisticated cyberattacks. You can use it to reduce human errors and increase the resilience of your surroundings, which are managed via the Cohesity Helios data platform. Security Advisor scans security configurations Security Advisor scans the customer's cohesity environment, including numerous security configurations. The solution takes into account ...

Read more

30 percent of families have been victims of a phishing attack
30 percent of families have been victims of a phishing attack

Phishing emails can hit anyone, whether in the office or in your own four walls. The risk of phishing attempts increases with children - both in private and at work. This is shown by the current survey “Cybersecurity in Numbers” by G DATA CyberDefense in cooperation with Statista and brand eins: More than 35 percent of those questioned with children in the household had already been the victim of a phishing email. Phishing emails are still one of the biggest cyber threats. Countless such messages end up in private or business mailboxes every day. Families are exposed to a significantly higher risk of phishing….

Read more