News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

VMware-ESXi: Attacks threaten tens of thousands of servers
VMware-ESXi: Attacks threaten tens of thousands of servers

The attacks on the VMware ESXi never end. They continue to threaten tens of thousands of servers and require updating to the latest VMware ESXi version, according to Bitdefender experts. Even rescue scripts no longer work because the ransomware has adapted. The attacks on the VMware ESXi hypervisors, which exploit the recently discovered CVE-2021-21974 vulnerability with little effort to play a wide variety of payloads as remote code, have enormous potential for spreading. They are therefore developing into mass attacks for opportunistic cybercriminals and are a current example of hybrid attacks: VMware-ESXi : Example of hybrid attack In…

Read more

Russian hackers want to use ChatGPT for attacks

Customer access is required for full use of OpenAI's AI system ChatGPT. Russian hackers are currently looking for ways to bypass this access to use ChatGPT to achieve their malicious goals. But that's what a lot of hackers want right now. Conversation notes from the dark web. Check Point Research (CPR) is monitoring attempts by Russian hackers to bypass OpenAI restrictions to use ChatGPT for malicious purposes. In underground forums, hackers are discussing how to bypass controls of IP addresses, payment cards and phone numbers - all necessary to access ChatGPT from Russia...

Read more

With AI and ChatGPT algorithm - hunt down cybercriminals
With AI and ChatGPT algorithm - hunt down cybercriminals

The further development of neural networks, AI and machine learning is becoming a real "game changer". The chatbot ChatGPT is currently making this more than clear. Sophos AI uses the advanced GPT technology to realize even better security applications. As the scale increases, neural networks get better and better. The basis for the program is the GPT-3.5 language processing model, which also comes from OpenAI. At supercomputing scale and in conjunction with machine learning, Sophos AI uses this advanced technology to realize even better security applications. Because especially in the area of ​​cyber security, the enormous performance stands out in contrast to…

Read more

Minimize the risk of phishing
Minimize the risk of phishing

Hardly a month goes by without warnings about new phishing attacks. Phishing remains one of the top cyber threats. With eight central measures, companies can significantly minimize the risk of attack. Attackers' phishing methods are becoming more and more sophisticated using the latest technologies. The fact that more and more employees are working on the go or from their home office and are sometimes switching between company and private devices also plays into the hands of the attackers. In addition, hackers benefit from three developments in particular: Employees are spending more and more time of their private lives online, making it easy for attackers to...

Read more

VMware ESXi Server: Expert analysis of ransomware attacks
VMware ESXi Server: Expert analysis of ransomware attacks

In the ransomware wave, which, according to the BSI, affects thousands of servers worldwide, including a mid-three-digit number of German companies, the attackers are targeting server farms - so-called ESXi servers - and thus the heart of every IT landscape. Outdated and unpatched VMware ESXi servers that still work with the February 2021 vulnerability were specifically attacked. According to the BSI - Federal Office for Information Security, thousands of servers running VMware's ESXi virtualization solution were infected with ransomware and many were also encrypted in a widespread global attack. The regional focus...

Read more

2023: What comes after 10 million DDoS attacks in 2022?
2023: What comes after 10 million DDoS attacks in 2022?

In particular, the Russian war of aggression in Ukraine caused an extreme increase in DDoS attacks in 2022. While the rise in ransomware isn't as high, the quality of the attacks is increasing, making them harder to defend against. A comment from Netscout. Cyber ​​attacks with the Morris worm date back to 1988 and were a rare sensation at the time. Today, with millions of attacks per year, they are part of daily business and are developing at a rapid pace. In the first half of 2022 alone, there were over 6 million DDoS attacks worldwide. Even if…

Read more

Source of risk open source licenses
Source of risk open source licenses

While vulnerabilities in open source code continue to make headlines, such as Other technologies, such as Heartbleed and Log4Shell, go unnoticed by a hidden source of open source risk - non-compliance with open source licenses. Open source software licenses are a major source of risk, Palo Alto Networks believes, because even a single non-compliant license in the software can lead to legal action, time-consuming remedial actions, and delays in getting a product to market. Despite the obvious risk, being compliant with licensing regulations is no easy feat. The variety of open source licenses and the difficulty of determining which licenses apply to a piece of software makes…

Read more

2023: Enterprises must optimize their IT defenses
2023: Enterprises must optimize their IT defenses

Cyber ​​criminals never stand still. They constantly improve their methods and intensify their attacks on available targets. In 2023, companies will once again be faced with the task of further optimizing their IT defenses. When it comes to cyber insurance, a good defense is also expected or there is no policy. 2022 was not a quiet year for IT security either. Hackers have crossed new borders: Organized criminals attacked governments, like Conti in the Costa Rica case. The Lapsus$ group attacked well-known players in the digital economy such as Microsoft, Nvidia, Uber, Globant and others. Hacker collectives developed sophisticated, powerful tools for…

Read more

Comments on the Hive ransomware network takedown
Ransomware network Hive smashed

Investigators from Germany, the USA and the Netherlands have broken up the global ransomware network "Hive". The German prosecutors stated that of the more than 1.500 cyber attacks on organizations worldwide, 70 attacks were in Germany. Experts Kimberly Goody and John Hultquist commented on the Hive network and the likely consequences of the takedown: “In our 2022 incident response surveys, Hive was the most active of all ransomware families observed: Hive was responsible for more than 15 percent of ransomware attacks responsible to which we have responded. Those affected come from a large number of countries. The biggest…

Read more

KI ChatGPT as cyber criminals
KI ChatGPT as cyber criminals

Since the furious start of ChatGPT, not only millions of people have been using artificial intelligence to get travel tips or to have scientific contexts explained. Security researchers and cyber criminals are also trying to figure out how the tool can be used for cyber attacks. Actually, the software should not recommend criminal acts. White hat hacker Kody Kinzie tried out how this still works and where the limits of intelligence lie. Illegal and unethical At the beginning there is a simple question: "How can I hack a certain company?" The chatbot seems to be trained for requests of this kind, because in...

Read more