News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

DsiN practice report: 42 percent of medium-sized companies report IT attacks
DsiN practice report: 42 percent of medium-sized companies report IT attacks

The current "Germany safe online" DsiN practice report under the auspices of the Federal Ministry of Economics shows more frequent damage caused by IT attacks in medium-sized companies. Smaller companies in particular do not adequately protect themselves against IT risks. Corona is increasing digitization, necessary protective measures are lagging behind. The proportion of far-reaching IT attacks on medium-sized companies increased noticeably during the corona pandemic. According to the practice report 2022 by Germany safe online (DsiN), more than three-quarters of all attacks led to noticeable effects (76 percent), with every eighth company they were given as significant, with four percent even as a threat to their existence. At the same time, awareness of...

Read more

Cloud Security: Patch management for cloud workloads
Cloud Security: Patch Management for Cloud Workloads

Cloud Security: Cloud computing has become a fundamental pillar of operations for businesses and organizations of all sizes. What is easy for the user turns out to be complex for the administrators at second glance and from the maintenance point of view. IT security managers should therefore be aware that cloud structures inevitably require patch management and that this task is their responsibility. More and more workloads and infrastructure are moving to the cloud, which provides mobile and content services and serves as an alternative to traditional network infrastructure. Eight out of ten companies now have a…

Read more

IIoT in the hacker focus: connecting IT and OT security securely
IIoT in the hacker focus: connecting IT and OT security securely

Automation and digitization of operational processes bring many advantages to medium-sized companies, for example in terms of production flexibility or pricing for the market. But the more successful a company is, the more attractive it becomes for cybercriminals, for example for attempts at blackmail with ransomware. Here it is important to securely combine IT and OT security. In terms of IT security, medium-sized companies are now well positioned. Surveys have sometimes shown that medium-sized companies in the IT security sector use up to 50 different security tools to counter all IT threats. With a well thought-out security strategy, the IT security area covers internal business processes, protects communication with...

Read more

Managed security services: important key to IT insurance protection
Managed security services: important key to IT insurance protection

In view of the economic dimensions of IT security incidents, IT insurance cover or cyber insurance can in many cases become the decisive lifeline for companies. The importance of cyber policies is therefore increasing. At the same time, the criteria for awarding them are becoming stricter. If you want to benefit from protection, you not only have to bring your IT security up to date, but also increasingly have to prove external protection - for example through managed security service providers. MSSP - Managed Security Service Provider Cyber ​​policies have become an important part of IT security for companies. They supplement existing defense technologies with an important component: absorbing the financial damage...

Read more

Russia-Ukraine War: Complex Cyberespionage 
Russia-Ukraine War: Complex Cyberespionage

The war in Ukraine is also a cyber war that promotes cyber espionage. Bitdefender Labs discover recent attacks on the Elephant framework. Attacks also take place through phishing with the download of supposed Bitdefender AV software. A summary of current cyber espionage. Companies in the attacked country or in supporting nations connected to Ukraine are threatened by classic IT attack mechanisms, the perpetrators of which are politically motivated this time. In addition to deleting information, these include espionage. The Bitdefender Labs have analyzed the sophisticated attack mechanisms of the so-called Elephant Framework used for this. Cyber ​​war worsens global cybersecurity posture Threat intelligence experts…

Read more

Phishing: Two million attacks via HTML files
Phishing: Two million attacks via HTML files

Kaspersky experts warn of the growing threat of phishing emails containing HTML files. From January to April 2022, Kaspersky blocked almost two million phishing emails with such attachments. Using HTML files in phishing messages is one of the latest and most popular tricks used by scammers. Usually, such links are easily detected by anti-spam engines or anti-virus software, however, using HTML attachments has allowed cyber criminals to avoid detection. HTML Phishing Approaches Many users are unaware that files in phishing emails can be insecure, so they often open malicious HTML attachments unknowingly. Cybercriminals design…

Read more

Ransomware victims: 88 percent of companies would pay again
Ransomware victims: 88 percent of companies would pay again

Two thirds of companies worldwide have been victims of ransomware. At the same time, Kaspersky found in a survey that 88 percent of companies that were already victims of ransomware would pay the ransom again if they were attacked again. A recent Kaspersky study shows that 88 percent of companies that have already been the target of a ransomware attack would pay a ransom if they were attacked again. In contrast, for companies that have not yet been hit by a ransomware attack, only 67 percent would be willing to do so in principle – but they would be less inclined to do so immediately. The payment of…

Read more

Bluetooth Hack – Millions of cars like Tesla or mobile devices at risk
Bluetooth hacked - millions of cars, devices and locking systems at risk

NCC Group performs the world's first link-layer-relay attack (hack) on Bluetooth Low Energy and uncovers vulnerabilities in proximity-based mechanisms, which NCC Group says also kills millions of cars such as the Tesla 3 or Y, as well as mobile devices and locking systems are at risk. Global cyber security expert NCC Group announced today that it has carried out the world's first link layer relay attack on Bluetooth Low Energy (BLE). BLE is a standard protocol for data exchange between devices used by companies for short-range authentication to protect millions of vehicles, smart locks...

Read more

Study on Enterprise Active Directory Security Posture
Study on Enterprise Active Directory Security Posture

Semperis Releases Enterprise Active Directory Security Posture Study Reveals Significant Differences Across Industries in AD Security. There are still a lot of security gaps to be found. Organizations of all sizes and industries are failing to close Active Directory (AD) vulnerabilities that can leave them vulnerable to cyberattacks, according to a survey of IT and security leaders using Semperis' Purple Knight. Enterprises scored an average of 68% across five Active Directory security categories, a mixed score. Large organizations scored even worse on the score — with an average score…

Read more

Backup-to-Disk: Central element of modern data backup
Backup-to-Disk: Central element of modern data backup FastLTA

Various technologies used for data backup have been declared "dead" several times. In addition to the long-running tape, the hard drive was also repeatedly attacked. Far from it - we explain why! It's often said that flash storage will replace everything and that disk backups are a thing of the past. The reality is different: Disk backups are becoming more important, helping to reduce the cost and hassle of flash storage and last line of defense technologies. We'll show you why. The New Complexity of Data Protection With the increased threat of ransomware and cyber attacks,…

Read more