News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

FBI, Europol, NCA: APT group LockBit smashed!

According to the authorities, Europol, the FBI and the British NCA have dismantled the APT group LockBit. At least it has all darknet leak sites under control and is probably already distributing decryption tools. The authorities even used the system of leak sites to distribute information and tools. It sounds too good to be true: A global network of authorities such as the FBI, Eruopol, NCA and many more have succeeded in striking a significant blow against the APT group LockBit. Officially, the group's network has been dismantled, the servers taken over, source codes and documents confiscated and...

Read more

Phishing, vishing and quishing
Phishing, vishing and quishing

In the early days, phishing attacks were often very simple and used legitimate sources of written communication such as email to gain access to sensitive data. In the age of AI, it is tempting to consider how attackers are modernizing their phishing methods. With the growing popularity of GenAI tools, voice-based phishing attacks – also known as “vishing” – have become the new norm and the evolution of attack methods continues. Phishing as a springboard To understand the importance of phishing in the malware industry, it helps to look at the anatomy of a...

Read more

Pawn Storm under the microscope
Pawn Storm under the microscope

Pawn Storm (also APT28 or Forest Blizzard) is a group of APT actors characterized by persistent repetition in their tactics, techniques and procedures (TTPs). The group is known for still using its decade-old phishing email campaigns targeting high-value targets around the world. Although campaign methods and infrastructure gradually change over time, they still provide valuable information about Pawn Storm's infrastructure, including those used in more advanced campaigns. Trend Micro has the…

Read more

Pig Butchering: Lucrative business model for cyber gangs
Lucrative business model for cyber gangs

Sophos has uncovered how Sha Zhu Pan scammers are now using a business model similar to “cybercrime-as-a-service” for their supposedly romance-oriented so-called pig-butchering scams. The fraudsters sell Sha-Zhu-Pan kits on the Dark Web all over the world and are expanding into new markets. Sophos describes these operations (also known as pig booking) in the article “Cryptocurrency Scams Metastasize into New Forms.” The new sets come from organized crime gangs in China and provide the technical components needed to implement a special pig-butchering program called “DeFi savings”. The criminals pose…

Read more

Fines for violating the GDPR
Fines for violating the GDPR

The General Data Protection Regulation (GDPR) came into force in November 2018 to standardize the rules for processing personal data across the EU. Violations of the GDPR sometimes result in high fines. But even outside the EU there is a risk of fines if the applicable data protection laws are ignored. The Gisma University of Applied Sciences (www.gisma.de) has examined which companies worldwide have had to pay the highest fines and in which countries the most severe penalties have been imposed. Facebook and Meta lead the ranking with fines totaling 7,1 billion euros. In 2019 the…

Read more

Cyber ​​attacks are the main reason for business failures
Cyber ​​attacks are the main reason for business failures

A leading provider of data protection and ransomware recovery solutions by market share, releases the results of its fifth annual report. While companies say they will spend more money to defend against cyberattacks, the survey also found that IT leaders feel even less protected and are more concerned about their ability to recover business-critical data. Cyberattacks remain the leading cause of outages, and data shows that while organizations are increasingly turning to the cloud for major recoveries, only a small percentage believe they...

Read more

Threat Report H2-2023: Botnets, Ransomware, DDoS 
Threat Report H2-2023: Botnets, Ransomware, DDoS

The second half of 2023 was characterized by classic threats such as DDoS attacks and ransomware, but also by the sudden disappearance of the busy botnet Mozi. In addition, the API keys of ChatGPT users are at risk. The ESET Threat Report H2 2023. In the new ESET Threat Report H2 2023, the European IT security manufacturer presents these and other threats as well as trends in the global threat landscape from June to November 2023. The aim of the report is to raise awareness of the biggest cyber threats and provide information about current risks. For more information, see ESET Threat Report H2…

Read more

Cyber ​​incidents – business risk number 1
Cyber ​​incidents remain the number 1 business risk - Image by Markus Winkler on Pixabay

Cyber ​​incidents will remain the largest business risk worldwide in 2024, according to the current Allianz Risk Barometer. This includes data breaches, but especially attacks on critical infrastructure or assets as well as ransomware attacks. The Allianz Risk Barometer puts business interruptions in second place in the survey in Germany. IT now forms the basis for almost all business processes. In the event of a compromise or disruption, all or many areas of the company are directly affected and business interruptions quickly result - which explains their place on the barometer. By classifying cyber risks as the largest business risk, risk assessment gains significant...

Read more

Risks from generative AI
Risks from generative AI

Generative AI systems like ChatGPT and Copilot have started their triumphant advance and will no longer be able to be stopped. Technologies that can independently create text and images using simple prompts and generate ideas have significantly changed the way we think creatively and solve problems in a short period of time. Although (generative) AI was initially met with some reservations - particularly when it comes to job losses - it is becoming increasingly clear that this technology can complement, rather than replace, human skills. Generative AI is evolving and becoming established in the business world…

Read more

Threat situation requires cybersecurity outsourcing

Cybersecurity – times are getting tougher: More than half of the companies surveyed (53 percent) expect a significant increase in cyber threats in the future. 43 percent, on the other hand, believe that the current level of cyber attacks will remain constant. This was the result of an interesting survey as part of a Cybersecurity as a Service study by Sophos. A so-called security operations center (SOC) is a crucial element of a modern, proactive security strategy. It focuses on the detection, analysis and response of security incidents in order to minimize the corresponding risks and to optimally protect data and business-critical processes in companies...

Read more