News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Darknet job exchange: Hackers are looking for renegade insiders
Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices or disappointed company employees offer their services to criminal gangs as insiders. This time, Check Point Research is putting the spotlight on the Darknet personnel scene. Not only are drugs, weapons, personal data, bank accounts, credit cards, hacking tools, malware and ransomware traded there, but renegade employees also offer their services as insiders, or hacker gangs look for such insiders as accomplices. Hackers are looking for employees who spread malware or ransomware “Cyber ​​criminals often use specialized forums…

Read more

Solar energy systems – how safe are they?
Solar energy systems - how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. Trend Micro, one of the world's leading providers of cybersecurity solutions, has released a new report examining the IT security of distributed energy systems. The researchers particularly examined the network gateways of solar energy systems - one of the most popular forms of decentralized energy generation. The increasing decentralization of the electricity supply not only represents progress in the energy transition, but also raises new security questions. Some solar energy systems pose safety risks The investigation of…

Read more

New wave of phishing: Attackers use Adobe InDesign
New wave of phishing: Attackers use Adobe InDesign

There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. According to Barracuda Telemetry, the number of emails containing Adobe InDesign links has increased nearly 30x since October. While the daily number was previously around 75 per email per day, it has now increased to around 2.000. Almost one in 10 (9 percent) of these emails contain active phishing links. Many of these links have the top-level domain “.ru” and are hosted behind a Content Delivery Network (CDN) that acts as a proxy for the source site. This…

Read more

Cyber ​​attacks: decline in the DACH region

There were fewer cyberattacks in Q4 2023 than in the same quarter of 2022. However, ransomware attacks have increased. Wholesale and retail trade in particular were attacked more frequently. The education sector remains the frontrunner. Check Point Research has published its new statistics on cyberattacks for Q4 2023 and takes a look at the overall situation in 2023. 1 in 10 organizations worldwide affected by an attempted ransomware attack The clearest message: The number of ransomware attacks fell in many countries Cyberattacks decreased compared to Q4 2022, but ransomware attacks increased sharply. In the year…

Read more

Cyber ​​resilience: Top management is in demand
Cyber ​​resilience: Top management is in demand

In 2024, cyber resilience will be a big topic at the management level. Because data backup is the basis for the continuity of business processes. AI as a feasible and practical technology will play an important role. The following trends will play an important role in 2024 in implementing cyber resilience in companies technically and organizationally: Trend 1: AI and ML will become viable and affordable technologies Artificial intelligence (AI) and machine learning (ML) will become a reality for many companies from upper mid-sized companies onwards into a tangible and exploitable technology to maintain data security and data availability. AI can always...

Read more

Blackwood: Chinese malware collects data
Blackwood: Chinese malware collects data

The Chinese hacker group “Blackwood” is spying on people and companies in the UK, China and Japan using a tool called NSPX30. The malware reaches the target devices via official app updates. Cybercriminals are always finding ingenious ways to get valuable data. As ESET researchers have discovered, a previously unknown hacker group from China is hunting for data using a new tool called NSPX30. The special thing about it: Instead of infecting the user via malicious email attachments and websites, it reaches its target systems via official app updates. Since 2018, “Blackwood” has been spying, as the team…

Read more

Cyber ​​attacks cost over 5 million euros annually
Cyber ​​attacks cost over 5 million euros annually

Cyber ​​attacks are increasing. Last year, 71 percent of German companies fell victim to ransomware. 59 percent paid ransoms. 53 percent fear more hacker attacks through generative AI technologies. Barracuda Networks has released its Cybernomics 101 Report, which analyzes the financial impact and profit motives behind cyberattacks. The research found that for German companies, the average annual cost of responding to attacks is around 5,7 million euros ($6,2 million). Ransomware attacks on over 70% of German companies The report also raises alarm as hackers explore how to use generative AI technology (GenAI)...

Read more

Top malware: Qbot resurrected in December
Top malware: Qbot resurrected in December

In December 2023, Nanocore was at number one on the malware charts, Qbot was back and the most frequently attacked industry was education and research, ahead of healthcare. Check Point® Software Technologies has released its December 2023 Global Threat Index. This month, the Qbot malware was used by hackers as part of a phishing attack targeting businesses in the hospitality industry. In the campaign, hackers impersonated the US Internal Revenue Service (IRS) and sent fraudulent emails with PDF attachments containing embedded URLs and containing a Microsoft installer...

Read more

Ransomware: Cybercriminals are becoming more professional
Ransomware: Cybercriminals are becoming more professional

Cybercriminals act profit-oriented, as we know from companies, and continue to professionalize and rationalize their attack methods. That's why 2024 will be another year of ransomware. In 2024, we can expect the ransomware industry to become more opportunistic, said Martin Zugec, Technical Solutions Director at Bitdefender. This trend culminated in the CitrixBleed attack in 2023. The security experts at Bitdefender Labs believe that the following trends will dominate ransomware activity this year: 1. Accelerated exploitation of zero-day exploits Cybercriminals who rationally and efficiently use automated scans...

Read more

Cyber ​​danger: HTML smuggling
Cyber ​​danger: HTML smuggling

With HTML smuggling, the malicious file is first created on the user's computer. Therefore, traditional anti-malware programs and sandboxes do not detect the attack. AI-based browser isolation provides protection. HTML smuggling is a highly efficient malware distribution technique that uses legitimate HTML5 and JavaScript functions to infect. This smuggling technique distributes Remote Access Trojans (RATs), banking malware, and other malicious payloads because HTML smuggling bypasses traditional security controls such as web proxies, email gateways, and legacy sandboxes. Attackers hide their activities in seemingly harmless web traffic, making it difficult for security tools to...

Read more