News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​risk: electric vehicle charging stations
Cyber ​​risk: electric vehicle charging stations

Charging stations and applications for electric vehicles are often inadequately protected against security risks. Successful cyberattacks on such applications enable actions ranging from fraud to sabotage. With an expected market capitalization of $457 billion in 2023, the electric vehicle market is expected to nearly double by 2027 with expected sales of 16 million vehicles per year. To meet the growing need for charging stations and provide EV owners with a seamless experience, the number of applications for EV charging stations has increased exponentially. There are end-user apps for finding charging stations, payment apps…

Read more

Drastic increase in malware threats
Drastic increase in malware threats

Security threats in OT and IoT environments are increasing rapidly. Healthcare, energy and manufacturing are particularly affected. Nozomi Networks Labs' analysis of unique telemetry data - collected from OT and IoT environments spanning a variety of use cases and industries worldwide - has revealed that malware-related security threats have increased 10x in the last six months. Across the broad categories of malware and potentially unwanted applications, activity increased by 96 percent. Threat activity related to access controls has more than doubled. Inadequate authentication and password hygiene led to...

Read more

Email blackmail on the rise

In extortion emails, cybercriminals threaten to publish compromising information about their victims, such as an embarrassing photo, and demand payment in cryptocurrency. Attackers often purchase victims' login credentials or obtain them through data breaches to "prove" that their threat is legitimate. To gain a better understanding of the financial infrastructure attackers use in extortion emails, Barracuda partnered with researchers at Columbia University to analyze over 300.000 emails captured by Barracuda Networks' AI-based detectors over a period of one year year when extortion attacks were detected. Below are the…

Read more

Risks of quantum computing in the automotive industry
Risks of quantum computing in the automotive industry

Impact of quantum computing technology on the automotive industry, the potential cybersecurity risks of the new technology and the risk mitigation options for car manufacturers. Quantum computers are based on an emerging technology that could change the design and use of cars in the future. They use the principles of quantum mechanics to carry out calculations that far exceed the capabilities of classical computer-aided calculations (“computing”). In contrast to classical digital calculations, which rely only on binary states of zeros and ones, the calculations use quantum bits or qubits that can exist in multiple states at the same time. Through this…

Read more

Mobile devices: High risk from AI-generated attacks
Mobile devices: High risk from AI-generated attacks

On mobile devices, the risk of a cyber attack through infected apps, fake AI websites, fake proxy servers and phishing is high. Generative artificial intelligence (AI) tools such as ChatGPT and Google Bard are becoming increasingly popular around the world. They enable their users to increase efficiency and productivity in their daily work. However, these diverse application possibilities are both a blessing and a curse, as they can also be misused by hackers for cyber attacks. Shortly after their introduction, generative AI tools were quickly used to create malware. Many of them appeared in the official app stores. Aside from that…

Read more

Renewable energy systems inadequately secured
Renewable energy systems inadequately secured

In April 2022, a few months after the Russian attack on Ukraine began, three wind energy companies in Germany were hit by cybercriminals. The attacks paralyzed thousands of digitally controlled wind turbines. It is estimated that by 2050, the world's power systems will depend on 70 percent renewable energy, primarily from solar, wind, tidal, rain and geothermal sources. These energy sources are typically decentralized, geographically remote, and relatively small. They are often managed and operated using insufficiently secured digital technologies that are directly linked to the aging infrastructure of national electricity grids…

Read more

Realst Infostealer malware infects macOS targets
Realst Infostealer malware infects macOS targets

Realst Infostealer is distributed via fake blockchain games and also targets macOS operating systems. In early July, security researcher iamdeadlyz reported on several fake blockchain games being used to infect both Windows and macOS targets with infostealers capable of emptying crypto wallets and stealing saved password and browsing data. In the case of macOS, the infostealer turned out to be a new malware written in Rust called "realst". Building on a previous analysis, SentinelLabs, the research arm of SentinelOne, identified and analyzed 59 malicious Mach-O samples of the…

Read more

How data helps to ward off IT threats
How data helps to ward off IT threats

To effectively protect a company's IT, cybersecurity teams and security operations centers (SOC) must closely monitor it - to do this they need data and metrics. Which metrics are particularly valuable at the user, endpoint and network level is explained Ontinue, leading expert in Managed Extended Detection and Response (MXDR). EDR (Endpoint Detection and Response) tools and SIEM (Security Information and Event Management) platforms provide cybersecurity professionals with security-relevant information from the endpoint level to the user and network levels. MXDR expert Ontinue gives examples of essential metrics of the respective security level that companies should always keep an eye on...

Read more

Make remote work hacker-proof
Make remote work hacker-proof

Working from home is still booming. This is why comprehensive protection against hacker attacks is so important for remote work. Each data breach causes costs of over 4 million euros on average. It is therefore extremely important for companies to protect data against loss and theft, even when working remotely. Valentin Boussin, Country Manager Germany at the French secure conferencing specialist Tixeo, explains how remote work can be made more secure. Target of attack: online communication One of the popular targets from which hackers steal data is online communication from companies. This is given that many companies are heavily relying on video conferencing, they…

Read more

Zero Trust principles: More security in the cloud
Zero Trust principles: More security in the cloud

Access to corporate networks is traditionally based on trust. This method is anything but secure. Security experts advise introducing a security infrastructure based on the Zero Trust principles. Companies are quite open about distributing permissions and access to their corporate networks to all employees. But now that more and more organizations are moving their applications and workloads from on-premises data centers to the cloud, the potential for unauthorized access, such as hackers, is growing. In the context of network modernization, the time is ripe for a security infrastructure based on the zero trust principle, believes NTT Ltd. and advises the following steps for implementation: 1….

Read more