News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

VPN no longer up to date?
VPN is no longer up to date

When companies were forced to transition to remote work during the pandemic, they needed a quick solution that gave their employees secure access to work resources. For many, this solution came in the form of VPN (Virtual Private Network), but these were not originally designed for the use of BYOD (Bring Your Own Device) and cloud apps. Lookout, a provider of endpoint and cloud security, now sees the end of VPNs. While VPNs can provide remote access, it may come as a surprise that they fall short when it comes to security. That’s because VPNs are for…

Read more

Cyber ​​risk Social engineering challenges companies
Cyber ​​risk Social engineering challenges companies

Social engineering is a major security risk. Cybercriminals steal credentials from individuals via mobile phishing attacks and infiltrate company infrastructure. Using personal mobile devices for work creates a major gap in security visibility. Security teams in companies are currently facing various challenges when it comes to threat monitoring, i.e. monitoring possible threats. Sascha Spangenberg, Global MSSP Solutions Architect at Lookout, explains the recent changes in attacker behavior: In the past, attackers have attempted to gain access to the infrastructure directly through vulnerabilities or using brute force methods. These attacks are…

Read more

Phishing attacks continue to be one of the biggest cyber threats
Phishing attacks continue to be one of the biggest cyber threats

Cybercriminals are becoming more and more perfidious, but they still stick to a familiar scam: phishing attacks. Although phishing has existed for nearly three decades, its prevalence and sophistication continue to grow, posing significant challenges to both individuals and businesses. Phishing involves cybercriminals impersonating trustworthy companies (also known as “brand phishing”) and sending fraudulent messages that contain malicious downloads or links. Last quarter, Walmart, Microsoft and Wells Fargo were the most imitated brands - an obvious tactic because world-famous company names inspire trust among victims. If a phishing attack is successful,...

Read more

Malware CloudEye replaces Qbot in first place
Malware CloudEye replaces Qbot in first place

In the global threat index for September 2023, the CloudEye malware is the most widespread. Healthcare facilities are the most common target of hackers. In August, the multi-purpose malware Qbot, aka Qakbot, was dismantled and shut down by FBI investigators. This marks the end of a long time for Qbot as the most widespread malware, after topping the global hit list for almost all of 2023. CloudEye leads the top malware Checkpoint's global threat index for September 2023 makes the consequences for the German threat landscape visible: CloudEye, formerly GuLoader, a downloader that injects malicious programs into Windows platforms,...

Read more

Security monitoring offers protection on a small budget
Security monitoring offers protection on a small budget

Smaller companies are also the target of cyber attacks. If your IT budget is limited, security monitoring can contribute to greater security. Too small to be attractive to hackers? This self-deception no longer works because cybercriminals now use a wide range of attack strategies. If just one attack is successful, it can threaten the company's entire existence. Security despite tight budgets But what if the budget for effective protective measures is limited? Wolfgang Kurz, managing director and founder of indevis, cites security monitoring as a possible answer - a lot can be achieved even with a small budget. The…

Read more

SMEs: threatened by cyber risks
SMEs: threatened by cyber risks

Cyber ​​attacks are a challenge for SMEs. Around half of SMEs worldwide have been the target of one. IT security challenge for small and medium-sized enterprises (SMEs). That's why more than half of them are calling for help in dealing with cyber risks. That's the finding of a new global study by Sage. The study reveals how SMEs perceive cybersecurity and outlines the key hurdles they face in this area. With the study, Sage strives to demystify the topic of cybersecurity and turn it from a daunting challenge into a tool...

Read more

Financial sector pays record sums in ransomware attacks

The number of annual ransomware attacks on companies in the financial sector is constantly growing: while it was 2021 percent in 34, the number rose to 2022 percent in 55 and is 2023 percent in the 64 report. There is no end in sight, according to the study “The State of Ransomware 2023”. Unauthorized entry into the systems usually occurs through exploited vulnerabilities (40 percent). Compromised credentials, on the other hand, are only responsible for 23 percent of attacks - one of the lowest rates in the financial sector. Here, educational work among the workforce could ensure greater safety awareness...

Read more

Analysis: This is how an attack by the Akira ransomware group works

South Westphalia's IT was attacked by the hacker group "Akira", which has meant that numerous local governments have only been able to work to a limited extent for weeks. The ransomware group encrypted server data and is now demanding a significant ransom, which is not paid. Akira, a new type of ransomware, only appeared in the spring. But who is actually behind the group? Trend Micro analyzes the background, techniques and tactics of this highly targeted successful group. “Our analysis shows that the ransomware uses similar routines to Conti, such as obfuscating strings and encrypting files. It also avoids the same file extensions as...

Read more

The financial industry cannot ignore the cloud
The financial industry cannot ignore the cloud

Although the security requirements for cloud computing are particularly high in the financial industry, more and more financial institutions are relying on cloud solutions. Greater flexibility, leaner processes, better scalability: these and other reasons are massively driving cloud use in companies. Only the financial sector has so far reacted cautiously in the face of uncertainties. But the new study “Cloud Monitor 2023: Financial Services” from KPMG shows that the industry cannot ignore cloud computing if it wants to help shape technological change. For Daniel Wagenknecht and Gerrit Bojen, both partners in the Financial Services department at KPMG, it is clear: the financial service providers in Germany...

Read more

More cyber attacks on critical infrastructure
More cyber attacks on critical infrastructure

Critical infrastructures are increasingly becoming the focus of cybercriminals. More than half of the attacks come from groups close to the state. Rockwell Automation's global study, "Anatomy of 100+ Cybersecurity Incidents in Industrial Operations," conducted by Cyentia Institute, analyzed 100 cybersecurity events that pose an imminent threat to operational technology (OT) and /or industrial control systems (ICS). As a result, almost 122 data points were collected and evaluated for each incident. Energy producers are popular targets The first edition of the report shows that almost…

Read more