News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Extract data from encrypted virtual hard disks
Extract data from encrypted virtual hard disks Image: AI - Bing

Experts show 6 methods that security professionals should know: They can be used to extract data from encrypted, virtual hard drives. These are important techniques for the cyber task force to recover information from locked virtual drives. In the event of data encryption by ransomware, "incident responders" and task forces must act quickly and efficiently to extract as much data as possible, for example from an encrypted virtual machine. The current Sophos report State of Ransomware 2024 once again underlines how important specialist knowledge and the right approach are: 58 percent of German companies were affected by ransomware last year and...

Read more

NIS 2: Too little support from management
NIS 2: Too little support from management

The NIS 2 Directive aims to achieve a high common level of cybersecurity in the European Union. Member states must ensure that organizations in 15 industry segments take appropriate measures to manage the risks to the security of network and information systems. A new study by Zscaler examines the current status of the implementation of NIS 2. The results of a survey of 875 IT executives in Europe show a discrepancy between the confidence of European organizations that they will achieve compliance with the regulations by the deadline of October 17th this year and the…

Read more

AI in cybersecurity: both a weapon and a cure
AI in cybersecurity: both a weapon and a cure

Many IT security experts agree that generative AI is THE solution to increasingly complex cyberattacks. AI could fill the gap left by the lack of qualified security staff. But cyber criminals have also jumped on the AI ​​bandwagon and are using it for their own purposes. Check Point Software Technologies, a leading provider of an AI-powered, cloud-based cyber security platform, has teamed up with market researchers at Vanson Bourne to find out how security experts plan to incorporate generative AI (GenAI) into their security architecture. The key findings from the study are presented here. Europe has the highest skills deficit of all regions Although…

Read more

Report: 86 percent of CISOs rely on AI-based cybersecurity
Report: 86 percent of CISOs rely on AI-based cybersecurity

72 percent of German Chief Information Security Officers (CISOs) see employee failure as the greatest cyber risk. 62 percent of them invest in employee training on data security, according to the results of a large survey. Proofpoint, a leading cybersecurity and compliance company, is publishing its new "Voice of the CISO" report. It examines the most important challenges, expectations and priorities of Chief Information Security Officers (CISOs) around the world. 80 percent of CISOs expect a major cyberattack This year's edition of the Proofpoint "Voice of the CISO" report reveals that CISOs of German companies continue to be very afraid of cyberattacks...

Read more

Impersonation attacks: strategies for defense
Impersonation attacks: strategies for defense

Threat actors exploit trust relationships to obtain access information of authorized users. This threat of impersonation attacks is becoming increasingly sophisticated. Awareness is the prerequisite for combating it effectively. Every significant power has an equally great potential for abuse. Among the many methods used by threat actors to pursue their goals, impersonation attacks (the attempt to gain unauthorized access to information systems by posing as an authorized user) have become a particularly critical factor. Such attacks undermine the fundamental trust in the security of digital systems and networks. It is simply a…

Read more

GDPR: Meta is the most common violator
GDPR: Meta is the most common violator

In the six years that GDPR has been in existence, data protection authorities reported over 2072 violations, resulting in €4,5 billion in fines. Germany ranks third with 186 violations and €55 million in fines. The European Union's General Data Protection Regulation (GDPR) has impacted the business landscape since it came into force on May 25, 2018. It was created to strengthen data protection and privacy of individuals. The legislation has also changed the way companies handle and process personal data. 2072 reported GDPR violations in six years of NordLayer's investigations…

Read more

Cyber ​​threat: incidents affect 60 percent of DACH companies
Cyber ​​threat: Incidents at 60 percent of DACH companies Image by beasternchen on Pixabay

The most common cyber threat to companies in DACH was business email compromise attacks, according to the results of a survey. Half of the security managers surveyed consider ransomware to be the greatest threat. Arctic Wolf publishes the results of its annual State of Cybersecurity: 2024 Trends Report. The report is based on a global survey of more than 1.000 senior IT and cybersecurity decision-makers. from companies in over fifteen different countries surveyed. 17 percent do not know whether there has been a security incident Almost half (48%) of all companies surveyed have experienced a security incident in the last twelve months,…

Read more

Financial institutions: Cloud vulnerability causes high damage
Financial institutions: Cloud vulnerability causes high damage

Financial institutions use the cloud for most applications and store their sensitive data there. Conventional security tools take care of the security. This makes it easy for cybercriminals to penetrate the IT of financial institutions. According to a study by Illumio Inc., the leading provider of zero-trust segmentation, the cyber risk for financial institutions increases significantly due to the use of the cloud. The study, conducted by the independent research company Vanson Bourne, found that in almost half (47%) of all cyberattacks in which the attackers penetrated the IT of financial institutions, the security vulnerability originally exploited was in the cloud. A single such data breach costs...

Read more

Cybersecurity: Damage caused by cyberattacks is increasing
Cybersecurity: Damage caused by cyberattacks is increasing

Cyberattacks on companies are becoming more frequent and more sophisticated thanks to the use of artificial intelligence. Advanced measures are therefore necessary to ensure cybersecurity. The Federal Criminal Police Office's (BKA) "Federal Situation Report on Cybercrime 2023" has revealed a sobering fact: the damage caused by cybercrime continues to rise, with the direct impact of cyberattacks, particularly ransomware and data extortion, increasing significantly. This paints a frightening picture of the threat situation facing companies and underscores the urgent need for robust cybersecurity measures. Evolving cyber threats The scale of the current challenge is increasing in combination with...

Read more

IT, IoT, OT: The riskiest devices
The riskiest devices

This year, more than ever, attackers are able to find access points across silos across devices, operating systems and embedded firmware, which form the basis for The Riskiest Connected Devices in 2024 report. Forescout Technologies delivers this fourth annual review of data collected from nearly 19 million devices through its research arm Vedere Labs, a leading international team dedicated to uncovering vulnerabilities and threats to critical infrastructure. “The device has evolved from a mere asset to a trusted, sophisticated, intelligent…

Read more