News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Report: Attacks Exacerbate the Global Cybersecurity Crisis
Report: Attacks Exacerbate the Global Cybersecurity Crisis

Further attacks exacerbate the global cybersecurity crisis, according to the latest NETSCOUT Threat Intelligence Report. Around 2021 million DDoS attacks were recorded from January to June 5,4. That is an increase of 11% compared to the same period last year. This development could break the record from 2020, with far-reaching effects on critical Internet gateways. NETSCOUT SYSTEMS, Inc. has published results in its semi-annual Threat Intelligence Report that underscore the dramatic impact of ongoing cyberattacks on businesses, public institutions and governments around the world. In the first half of 2021, around 5,4 million DDoS attacks (Distributed Denial of ...

Read more

The ransomware crisis needs a global solution
The ransomware crisis needs a global solution

Ransomware has now become a global problem. Cybercriminal groups operate from countries that offer them safe haven and allow them to launch even the most sophisticated attacks. A common global strategy is needed to prevent an escalation. An assessment by Michael Veit, security expert at Sophos. We are in the middle of a ransomware crisis. A plethora of increasingly extreme ransomware attacks have been observed over the past few months, such as the temporary shutdown of a major U.S. fuel pipeline. The rise in ransomware attacks is not a new phenomenon, but in this ...

Read more

Review: When attackers also use admin tools
Review: When attackers also use admin tools

What can be learned from the case studies of the Playbook 2021 in which companies are victims of cyber attacks? In a series of articles, Sophos experts travel back into the future and devote themselves to various specific aspects of IT security in order to derive recommendations that can be implemented by everyone. As described in the Sophos Active Adversary Playbook 2021, attackers like to use tools used by IT administrators and security professionals to make it harder to detect suspicious actions. Many of these tools are recognized by security products as "Potentially Unwanted Applications", PUA for short (or RiskWare or RiskTool), are ...

Read more

Ransomware on the rise
Ransomware on the rise

The new normal: ransomware on the rise. With the increased teleworking in companies due to the pandemic crisis, cybercrime has further upgraded and increased its ransomware capacities. In order to be able to keep pace with the other side despite changed conditions, companies must expand their IT security approach and strengthen their measures. Working from home as a result of the crisis helped a hitherto weak trend to become widespread in 2020: at the beginning of the pandemic, 75 percent of companies were working from home;

Read more

Hackers: Best Practices for Security Orchestration
Hackers: Best Practices for Security Orchestration

Security Symphony Against Hackers: Best Practices for Security Orchestration. All security solutions should be integrated into one system to simplify administration. A comment from Tim Bandos, Chief Information Security Officer, Digital Guardian. There was a time when IT teams viewed it as bad practice to have two separate antivirus programs running on the same device. Most IT teams today use multiple security tools and solutions at the same time. However, there is a need for a technology that can combine the protection and security functions of these tools. This is where the security orchestration comes in ...

Read more

Phishing emails cause the greatest damage in the home office

Survey by G DATA, brand eins and Statista shows: Phishing emails cause the greatest damage in the home office. Germany has some catching up to do when it comes to knowledge of IT security. New magazine as a reference work: “Cybersecurity in Numbers” Screaming children, an unfamiliar working environment and poor office equipment: Working from home is not just pleasant for all employees. In this environment, people are much more susceptible to phishing than in the office, as a joint representative study by G DATA, brand eins and Statista shows. The magazine "Cybersecurity in Numbers" contains many more survey results and statistics. Free Magazine: Cybersecurity in ...

Read more

Non-malware attacks are increasing
Non-malware attacks are increasing

G DATA threat report: attacks without malware are increasing. Cyber ​​criminals continue to attack companies more and more. The decline in attacks in 2021 is deceptive, as the number of attacks was extremely high in the 2020 pandemic. The current threat report from G DATA CyberDefense shows a significant decrease in the number of attack attempts averted in the first half of 2021 compared to the same period in the previous year. The reason for this is that attacks are no longer just used with malware. The risk for companies remains high. 40 percent decline according to statistics The number of cyberattacks averted has increased by more than 40 percent ...

Read more

Growing threat from droppers-as-a-service

New Sophos study reveals the growing threat of dropper-as-a-service. Disguised as pirated software, so-called droppers deliver entire bundles of malware, including programs for information theft, click fraud and much more. Sophos has published a new study entitled “Fake Pirated Software Serves Up Malware Droppers as a Service”. The study describes how cyber criminals use droppers, i.e. programs that serve as Trojan horses for malware, to deliver a variety of harmful and unwanted content to people looking for hacked versions of popular business and consumer applications. Fake Pirated Software Serves Up Malware Droppers as a ...

Read more

Pitfalls in the migration of security solutions
SME investments in IT security

There are some pitfalls for companies when migrating security solutions. Here are best practices for planning and executing from Tim Bandos, Chief Information Security Officer at Digital Guardian. Organizations familiar with the process of migrating to a new security solution know how difficult and time-consuming the task is. However, keeping up with the changing demands of cybersecurity is a must to protect a company's most important assets - its data and intellectual property. A migration plan must be drawn up correctly because ...

Read more

80 percent of companies expect data theft

Over 80 percent of all German companies expect their customer data to be stolen in the next year. The Trend Micro Cyber ​​Risk Index shows that companies are exposed to an increased risk of attacks - German companies have the most concerns in a European comparison. Trend Micro, one of the world's leading providers of cybersecurity solutions, confirms with a new study that the risk of cyber attacks has increased over the past year. For the next 12 months, 83 percent of all German companies assume that they will be affected by data theft. Most of the respondents judge attacks as ...

Read more