News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Webinar June 08, 2022: Making your endpoint secure
B2B Cyber ​​Security ShortNews

Security provider Trellix invites you to a free webinar on June 08, 2022 from 10:00 a.m. on "Endpoint Security Best Practices 2 - Exploit Prevention, Access Protection, DAC and ATP, how do I make my endpoint more secure." In the course of home office, cloud applications and zero trust approaches, the endpoint plays a central role in security considerations. Hackers are constantly finding new ways to gain access to corporate resources, steal data, or compromise systems. Often an employee's client system is the entry point - the "patient zero". Therefore, it is important to base the endpoint security solution on...

Read more

Test: 14 security solutions against data stealers and ransomware
AV TEST News

In the series of Advanced Threat Protection tests, the laboratory of AV-TEST tested 14 protection solutions for companies against data stealers and ransomware. In this Live Attack test, 10 real-world attack scenarios on Windows are to be fended off. In addition to detecting the malware, every single defense step of a protection solution counts. AV-TEST's Advanced Threat Protection tests test protection software in the laboratory using very real and dynamic attack scenarios. Since the effort involved in these tests is extremely high, the attacks per product are limited to 10 scenarios. In the December test, the lab identified 5 unique ransomware attacks…

Read more

APT group lures people into the trap with phishing emails about the Ukraine war
Eset_News

ESET researchers have uncovered an ongoing phishing email campaign by cyber-espionage group Mustang Panda. This is notorious for attacking government institutions, companies and research institutes. In the current case, the APT (Advanced Persistent Threat) group is attacking organizations in Asia, Sudan, South Africa, Cyprus and Greece. The victims are lured into the trap with phishing e-mails that deal with the Russian invasion of Ukraine. Other topical lures in the digital post included a COVID-19 travel restriction, an approved assisted area map for Greece and a European Parliament regulation. Those who fell for the criminals paved the way for…

Read more

Cybersecurity pros against APT
APT hackers for rent

The hacking industry, which is becoming more professional, not only offers malware and tools for rent. Criminal experts also make their work available for money. Their expertise in advanced persistent threats (APT) requires a defense at eye level: Managed Detection and Response (MDR). Cyber ​​crime has become more organized in recent years and is increasingly based on the example of the business world. For almost a decade, Malware-as-a-Service initially offered a quick entry into the world of cybercrime and the most diverse tools have always been on the illegal market: Remote Access Trojans (RAT), ...

Read more

Lazarus group is behind encryption trojan
News B2B Cyber ​​Security

The backdoor of the multi-platform malware framework MATA was used in VHD ransomware and exposed the APT group Lazarus as the backers of the. During the analysis of two cases of VHD ransomware in attacks in Europe and Asia, Kaspersky researchers were able to assign them to the notorious North Korean APT group Lazarus. Both the development of ransomware and the financially motivated background of it indicate a change in strategy for the group; both are highly unusual for a government-sponsored APT group. In March and April 2020 there were first reports about the so-called VHD ransomware, which is characterized by its self-replication ability and aims to collect money from ...

Read more