News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Report: Number of ransomware victims almost doubled
Report: Number of ransomware victims almost doubled

CyberRes, a division of Micro Focus, releases its first annual Cyber ​​Threat State of Play and Overview of Cyber ​​Events in 2021. The strategic report marks another milestone in the expansion of threat research that began with the launch of the Galaxy Online platform in January 2022 to provide better cyber resilience to the market. CyberRes research shows that the nature of threats has evolved rapidly. They target the growing attack surface of digital businesses. While companies recognize and use digitization as a competitive advantage, attackers are just as quick...

Read more

E-mail attacks are increasing by over 100 percent
E-mail attacks are increasing by over 100 percent

Trend Micro cloud-based email security blocked 33,6 million attacks last year. Email threats have increased by over 100 percent year-on-year, remaining the top threat of attack facing organizations. Trend Micro, one of the world's leading providers of cybersecurity solutions, was able to block over 2021 million email threats in cloud-based systems in 33,6. Overall, there was an increase of over 100 percent compared to the previous year. The strong increase in attacks shows that e-mails are still the main gateway for cyber attacks. Real data evaluated This data was collected over the course of the…

Read more

Key technologies against ransomware
Key technologies against ransomware

Ransomware is a chronic threat. But their appearance is constantly changing. On the one hand, behind the permanent change there is a scene that is becoming more and more professional, thinks more economically or even politicizes itself in the current crisis. On the other hand, there are new technologies. Here Bitdefender shows four pillars for defending against extortion attacks. An effective defense must set up itself accordingly in depth and ward off the extortionate attacks in the various phases. The current Bitdefender Threat Report, which takes into account the telemetry data from the previous month, shows for the month of May 2022 how active…

Read more

Survey: Cloud security worries security professionals
Survey: Cloud security worries security professionals

Cloud security is currently the top concern for cybersecurity professionals, according to a survey by Delinea, a leading provider of privileged access management (PAM) solutions for seamless security. At this year's RSA Conference in San Francisco, more than 100 security professionals were interviewed about their current biggest problems and their cyber hygiene practices. For 37 percent of those surveyed, securing the cloud (cloud security) is the main cause for concern, followed by ransomware (19 percent) and a distributed workforce (17 percent). Poll at RSA Conference “Protecting Digital Assets in the Cloud Becomes the Number…

Read more

Source of danger data sharing: Protection in Microsoft 365
Source of danger data sharing: Protection in Microsoft 365

The increasing use of cloud platforms such as Microsoft 365 enables employees to independently share files with colleagues, partners and customers. This results in risks for data security in companies. A comment from the cybersecurity experts at tenfold Access Management. The triumph of the cloud has been apparent for a long time, but has accelerated enormously, especially due to the extraordinary circumstances of the past few years. In order to replace personal meetings and exchanges in the office, companies are increasingly turning to cloud services such as Microsoft 365. This allows employees to share files regardless of their location, work together on...

Read more

Study: Organizations worried about growing attack surface

According to a study by Trend Micro, limited visibility and control threaten the IT security of companies worldwide. The current cyber risk study shows that companies are concerned about digital attack vectors that have gotten out of control. Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes the results of a new global study. This shows that companies are finding it increasingly difficult to identify and secure their increasingly complex attack surface. This in turn complicates the complete risk management. Constantly growing attack surface The study by the Japanese security provider shows that 65 percent of German companies (73 percent worldwide) are concerned about their growing attack surface. 40…

Read more

Study: CISOs rely on open source and cloud native

As a study by Aqua Security shows: CISOs rely on open source and cloud native. The result shows CISOs' perceptions of cloud native security and open source in IT security. Aqua Security, the leader in pure cloud native security, today released a new study on perceptions of open source solutions and cloud native security. The report is based on a survey of 100 US CISOs (Chief Information Security Officers) at Fortune 1000 companies, commissioned by Aqua Security. The purpose of the study was to increase the understanding and views of...

Read more

Hive Ransomware: Attack Sequence 
Hive Ransomware: Attack Sequence

The course of a ransomware attack using Hive was investigated by the Varonis forensics team during a customer deployment. The attack and the actions of the cyber criminals were documented in this way. First discovered in June 2021, Hive is used as ransomware-as-a-service by cybercriminals to attack healthcare facilities, nonprofits, retailers, utilities, and other industries worldwide. Most commonly, they use common ransomware tactics, techniques, and procedures (TTPs) to compromise victims' devices. Among others, phishing emails with malicious attachments, stolen VPN credentials and vulnerabilities are used to intrude into the targeted systems….

Read more

Conti, LockBit, Black Basta, ALPHV & Co: Ransomware Report

Malwarebytes has compiled a report on ransomware for May 2022. Conti, LockBit & Co. are also there. Unfortunately, newcomers such as BlackBasta and ALPHV are also becoming more and more successful with their attacks. With 73 ransomware attacks, LockBit was by far the most widespread ransomware in May 2022 according to the analysis of the Malwarebytes Threat Intelligence Team. This was followed by Black Basta with 22 attacks, ALPHV with 15 attacks, Hive with 14 attacks and Mindware with 13 attacks. Conti, on the other hand, only finished sixth in May – Malwarebytes wrote to the ransomware group…

Read more

Study: Too many app vulnerabilities go live
Study: Too many app vulnerabilities go live

According to a survey of 1.300 CISOs, 75 percent say: Too many app vulnerabilities get into operations. For 79 percent of CISOs, continuous runtime vulnerability management is critical to keep up with the growing complexity of modern multi-cloud environments. Dynatrace, the Software Intelligence Company (NYSE: DT), has released a global study of 1.300 chief information security officers (CISOs) at large organizations. A key finding: The speed and complexity introduced by the use of multi-cloud environments, multiple programming languages ​​and open-source software libraries make vulnerability management difficult. 75 percent of CISOs state that despite multi-layered security measures, gaps...

Read more