News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

IT security in times of the Ukraine war
IT security in times of the Ukraine war

It is still unclear whether a real cyber conflict will be added to the analogous Ukraine war – if such a conflict can be precisely defined at all. In any case, the current armed conflict poses a risk for the IT security of companies, even if it remains to be seen how the further risk situation will develop. In order to protect themselves effectively, companies should, on the one hand, keep an eye on current dangers and, on the other hand, follow security standards even more strictly. The company's own risk potential is measured by the geographic, business or even digital proximity of an organization to Ukraine. A defense...

Read more

Proclaimed Dead Live Longer: Emotet attacks tripled in March
Proclaimed Dead Live Longer: Emotet attacks tripled in March

Emotet continues to be more than active: in March, attacks using Emotet more than tripled. Germany is among the most attacked countries worldwide. The biggest problem: Emotet spreads itself via spam. Emotet, the world's most dangerous malware according to Europol. 2,2 percent of the attacked companies and private individuals in the first quarter came from Germany, which was among the top 10…

Read more

Cyber ​​war between Ukraine and Russia

Since mid-February 2022, NETSCOUT has been monitoring the threat landscape in Russia and Ukraine. The analysis revealed that DDoS attacks against Ukraine increased by 2022 percent in February 2021 compared to the same period in 134. On the other hand, since the conflict began, DDoS attacks against Russia have increased by around 236 percent compared to the previous month. While the frequency and volume of DDoS attacks against Russia and Ukraine have increased significantly, attacks against the EMEA region as a whole compared to the same period in 2021 decreased by…

Read more

Expensive cryptomining attacks on cloud infrastructures
Expensive cryptomining attacks on cloud infrastructures

Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes a new research report on cryptomining. The report details how cybercriminals are compromising and misusing corporate cloud infrastructures. Again and again, different groups even fight for control of the affected systems. The report shows that threat actors are increasingly looking for and exploiting vulnerable entities. Among other things, they use brute-forcing of SecureShell (SSH) credentials to compromise cloud resources for cryptocurrency mining. Victims often exhibit outdated cloud software in the cloud environment, lack of cloud security hygiene, or insufficient knowledge of the…

Read more

2021: Ransomware payments hit new record

Ransomware payments hit a new record in 2021 as more and more data is offered on the dark web. Recent study by Palo Alto Networks Unit 42 shows average ransom demand up 144 percent to $2,2 million, average payment up 78 percent to $541.010. Ransomware payments hit new records in 2021 as cybercriminals increasingly turn to dark web "leak sites". By threatening to release sensitive data, they pressure their victims to make them pay. This is reports Unit 42 of Palo Alto Networks (NASDAQ: PANW), worldwide...

Read more

Security professionals face record number of cyber threats
Security professionals face record number of cyber threats

Organizations are looking for new ways to protect their ever-expanding attack surface and remain secure. A study by Trend Micro shows that security professionals are facing record numbers of cyber threats and excessive workloads. A new study by security manufacturer Trend Micro, one of the world's leading providers of cybersecurity solutions, warns of the increasing threat to digital infrastructures and employees working from home, as threat actors increase their rate of attacks on companies and individuals. Security: Ransomware attacks target KRITIS Ransomware attackers are shifting their focus to critical infrastructures and industries that are under high pressure to…

Read more

Study: Hybrid cloud solutions are the goal of companies

A survey conducted by Hornetsecurity shows that hybrid cloud solutions are a long-term goal for 2 out of 3 companies. In order to maintain on-premises infrastructure, a small proportion of respondents cited the need for full control over their data. A hybrid cloud adoption and implementation survey of more than 900 IT professionals in North America and Europe, among others, found that the majority of organizations (93%) are using or within a mix of cloud and on-premises solutions migrate fully to the cloud in the next five years. Half of the respondents (51%)…

Read more

The top three ransomware trends of 2021
The top three ransomware trends of 2021

2021 is likely to go down in cybersecurity history as the year of ransomware. The global list of prominent victims ranges from pipeline operators and entire districts to publishers and retail chains. The Varonis Threat Labs have identified three key trends that will also keep us busy in 2022. Because one thing is certain: we will also have to deal with ransomware this year, probably even more and with even more attacks than 2021. Ransomware-as-a-Service A clear shift towards the ransomware-as-a-service business model could be a-Service (RaaS) where groups recruit partners,…

Read more

Critical infrastructures: requirements of the IT Security Act 2.0
Critical infrastructures: requirements of the IT Security Act 2.0

Critical infrastructures (KRITIS) in the context of cyber attacks: are all protective measures in line with the new IT Security Act 2.0? The IT Security Act 2.0 has resulted in significant adjustments for operators of critical infrastructures. Producers and utilities in the fields of energy, water, finance and health as well as industrial companies are increasingly being targeted by attackers. The result: production losses worth millions and supply bottlenecks, up to and including endangering human life. Recent examples include attacks on the largest pipeline in the United States, the Irish health authority, and an incident at a Croatian substation that brought Europe to the brink of a power blackout. KRITIS attacks…

Read more

Archive data in a long-term and energy-efficient manner
Archive data in a long-term and energy-efficient manner

In order to use IT systems sustainably and efficiently, longevity, energy consumption and calculable costs are decisive when planning to archive data for the long term. Expert information including whitepaper from FAST LTA. As "long-term storage", data archiving is subject to special requirements. Compared to the usual investment periods of three years, energy consumption and maintenance are more important in the archive. IT components and providers must also withstand the critical selection. We take a closer look at the individual aspects and compare technologies Long-term storage of data Data archiving is the displacement of data that is stored in the productive environment…

Read more