News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

MDR with improved attack detection and mitigation

Bitdefender's new managed detection and response service MDR Foundations promises improved detection and mitigation of attacks through 24×7 monitoring and proactive threat hunting by experts. Bitdefender is expanding its Managed Detection and Response (MDR) offering with the new MDR Foundations service. The new service, which can be booked on a monthly basis and is customizable according to user needs, offers guided and fully managed detection and mitigation of attacks by human security experts. Thanks to the offering, Managed Security Providers (MSPs), Value Added Resellers (VADs) and their customers, who only have limited internal resources and skills, can monitor and defend against threats around the clock. Smart…

Read more

Solution for automatic DDoS attack mitigation
Solution for automatic DDoS attack mitigation

NETSCOUT announces a new solution for smarter and automated DDoS attack mitigation. An innovative approach uses global visibility and AI analytics to quickly respond to DDoS attacks and reduce operational overhead. NETSCOUT, a leading provider of cyber security, service assurance and business analytics solutions, announces the launch of a new Artificial Intelligence (AI) based solution. This allows customers to automatically and instantly block most DDoS attacks, simplifying operations and minimizing risk to their business. ATLAS Network with DDoS Monitor The solution leverages NETSCOUT's ATLAS network, an unmatched source for insight into DDOS attack activity...

Read more

E-mail attacks are increasing by over 100 percent
E-mail attacks are increasing by over 100 percent

Trend Micro cloud-based email security blocked 33,6 million attacks last year. Email threats have increased by over 100 percent year-on-year, remaining the top threat of attack facing organizations. Trend Micro, one of the world's leading providers of cybersecurity solutions, was able to block over 2021 million email threats in cloud-based systems in 33,6. Overall, there was an increase of over 100 percent compared to the previous year. The strong increase in attacks shows that e-mails are still the main gateway for cyber attacks. Real data evaluated This data was collected over the course of the…

Read more

Key technologies against ransomware
Key technologies against ransomware

Ransomware is a chronic threat. But their appearance is constantly changing. On the one hand, behind the permanent change there is a scene that is becoming more and more professional, thinks more economically or even politicizes itself in the current crisis. On the other hand, there are new technologies. Here Bitdefender shows four pillars for defending against extortion attacks. An effective defense must set up itself accordingly in depth and ward off the extortionate attacks in the various phases. The current Bitdefender Threat Report, which takes into account the telemetry data from the previous month, shows for the month of May 2022 how active…

Read more

Ransomware: Every 2nd company attacked in the first half of the year
Ransomware: Every 2nd company attacked in the first half of the year

A Cohesity study shows that almost half of companies have been attacked by ransomware in the last six months. A lack of collaboration between IT and security teams makes organizations more vulnerable to cyber threats. Many companies are more susceptible to cyber attacks such as ransomware attacks because IT and security officers (SecOps) work poorly together. This is shown by a study by Cohesity, a leading provider of data management solutions. Most IT and security decision-makers are convinced that both teams should share responsibility for their company's holistic data security strategy - i.e. from the prevention of cyber attacks to backup...

Read more

Cloud Service: Ransomware with data isolation and recovery
Cloud Service: Ransomware with data isolation and recovery

Cohesity FortKnox, available now, is a powerful defense against ransomware with data isolation and recovery as a service via the cloud. The Cohesity-managed service strengthens cyber resiliency by storing an immutable copy of data in a cloud vault. The FortKnox SaaS solution expands Cohesity's existing Data Management as a Service portfolio with offerings that run on Amazon Web Services (AWS). FortKnox is a modern data isolation solution and can significantly minimize the impact of cyber attacks such as ransomware. It is designed to provide an additional layer of offsite protection. At the same time, it simplifies the operation...

Read more

Armed with threat intelligence against cybercriminal activities

Against the background of the current geopolitical situation, an increasing number of cyber threats can be expected. Threat actors around the world have always taken advantage of uncertain times to launch campaigns against companies of all sizes and industries, adapting their methods and tactics accordingly. Companies should therefore use threat intelligence to gain a better overview. An analysis by Christian Milde, Managing Director Central Europe at Kaspersky. Accordingly, tracking, analyzing, interpreting and containing constantly evolving IT security threats is a mammoth task. However, threat intelligence provides deep insight into the threat landscape and allows organizations to…

Read more

What executives should know about ransomware attacks
What executives should know about ransomware attacks

Like most industries, cybercriminals have adapted and changed over the past two years as circumstances have changed. They have a wealth of evolving tools in their arsenal and are able to leverage many vectors to get to their destination: the valuable enterprise data. Varonis experts explain what every executive needs to know about modern ransomware attacks. This is how modern attackers have learned to launch even more disruptive ransomware campaigns. At the same time, they have become more efficient and adept at avoiding prosecution. How ransomware groups form after a…

Read more

Spyware Pegasus: Protect mobile devices from high-end malware
Spyware Pegasus: Protect mobile devices from high-end malware

Only recently did the world learn of Pegasus spyware, which primarily targeted journalists, politicians, human rights activists and defenders, and lawyers. Protecting yourself completely from such professional surveillance software is almost impossible. However, users can take certain measures that make it difficult for attackers to target them. Kaspersky experts give tips. Costin Raiu, head of the Global Research and Analysis Team (GReAT) at Kaspersky, has now compiled top-level recommendations on how mobile users of Android and iOS devices can protect themselves against Pegasus and other high-end mobile malware. spy ware...

Read more

Advanced Persistent Threats: Advanced threats

Advanced Persistent Threats (APT) are attacks in which hackers gain access to a system or network and stay there unnoticed for a long period of time. This is particularly dangerous for companies, as it gives cyber criminals constant access to sensitive data. These APT attacks also avoid detection by traditional security measures due to their sophisticated evasion and obfuscation tactics. The following article describes how cybercriminals respond to their attacks, how companies can identify warning signs of an APT attack, and best practices to reduce the risk of these threats. How Advanced Persistent Threats - APTs Work ...

Read more