News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Blue Yonder attacked – Starbucks affected
B2B Cyber ​​Security ShortNews

A few days ago, Blue Yonder, a provider of a management platform for supply chains, was attacked with ransomware. As a result, time tracking at Starbucks, for example, has been paralyzed and salary payments have been somewhat difficult. According to the company itself, the following happened: "On November 21, 2024, Blue Yonder experienced disruptions in its hosted managed services environment due to a ransomware incident. Since the incident became known, the Blue Yonder team has been working intensively with external cybersecurity firms to make progress in recovery. We have conducted several defensive and forensic...

Read more

Recovery: Companies change strategy after an attack
Recovery: Companies change strategy after an attack

2024 IT and IT security managers took part in the study for the Cyber ​​Recovery Readiness Report 1000. It showed that companies that fell victim to unauthorized access to data changed their behavior in securing data and thus significantly accelerated their recovery. The 2024 Cyber ​​Recovery Readiness Report study, conducted by Commvault in collaboration with GigaOM in eleven countries, shows that companies that have suffered a cyber incident in the past have comprehensively reassessed their data security and positioned themselves better. The effect of the additional investments and...

Read more

New old attack method: the attack of the worms
Trend Micro News

Earth Preta - or Mustang Panda - the hacker group is using self-propagating malware that spreads via removable storage devices and spear phishing campaigns in a new wave of attacks. The attacks are currently mainly targeting government agencies in the Asia-Pacific region (APAC). The Earth Preta group uses removable storage devices as an infection vector and pursues cyber espionage to control systems and steal data. Trend Micro recently reported an increase in the activities of Chinese threat actors, which include Earth Preta. Security Advisor Richard Werner at Trend Micro puts the group's activities into context. The return...

Read more

Secure Industrial IoT: A challenge for many 
Secure Industrial IoT: A challenge for many - Image by Vilius Kukanauskas on Pixabay

The concept of Industry 4.0 is essentially based on the digitization and networking of a company's production, logistics and administration. The core building blocks are the devices, sensors and machines connected to the company network and the Internet - the Internet of Things (IoT) and the Industrial Internet of Things (IIoT). For years, companies around the world have been working on the most comprehensive implementation of Industry 4.0 possible - including in Germany. According to an IDC survey from the end of last year, almost half of DACH companies want to increase the speed with which they can develop their IoT and IIoT parks this year...

Read more

Iranian TA453 targets well-known personalities
B2B Cyber ​​Security ShortNews

In a recent investigation, the Threat Research Team at is shedding light on the activities of the Iranian cybercrime group TA453. It is currently targeting a Jewish personality using the BlackSmith malware toolkit. During their analysis, the security experts were able to determine that TA453 has targeted a prominent Jewish personality using a new malware toolkit called BlackSmith - which deploys a PowerShell Trojan called AnvilEcho. Joshua Miller, Senior Threat Researcher at Proofpoint, comments on the investigation results: "TA453 phishing campaigns that we have observed reflect the priorities of the Islamic Revolutionary Guard Corps intelligence service. This malware deployment, which is based on a...

Read more

AI assistant for security analysis in enterprise solutions
AI assistant for security analysis in enterprise solutions Image by T Hansen on Pixabay

Upgrade for business solutions: With ESET AI Advisor, artificial intelligence now supports security managers in their day-to-day security work. SMEs and other companies also receive help with endpoint and XDR solutions. ESET's generative AI-based cybersecurity assistant improves incident response and interactive risk analysis. This enables companies to take advantage of Extended Detection and Response (XDR) solutions even if they have limited IT resources. ESET AI Advisor was first presented at the RSA Conference 2024 and is now available in ESET PROTECT MDR Ultimate and ESET Threat Intelligence, among others. The…

Read more

LockBit is back: cyber attack on KJF with 17 clinics and schools 

The KJF – the headquarters of the Catholic Youth Welfare Department of the Diocese of Augsburg e. V. suffered an extensive cyber attack. The hackers around LockBit list the attack on their leak page on the dark web. The hackers accessed 17 associated clinics, facilities and schools via the KJF systems. According to KJF, data on personnel, finances, patients and health data were leaked. The headquarters of the Catholic Youth Welfare Department of the Diocese of Augsburg e. V. (KJF Augsburg) was the target of a cyber attack on April 17.04.2024, XNUMX. According to the Darknet, the LockBit group claims the crime for itself and lists the KJF on its leak page...

Read more

Browser attack: Acceleration through graphics card as a point of attack
Browser attack: Acceleration through graphics card as a point of attack MS - AI

Browser attack: Using a website with malicious JavaScript, researchers from the Institute for Applied Information Processing and Communication Technology at Graz University of Technology were able to spy on information about data, keyboard entries and encryption keys on third-party computers in three different attacks via WebGPU. Modern websites place ever greater demands on the computing power of computers. Therefore, in addition to the CPU of a computer, web browsers have also been given access to the computing capacity of the graphics card (Graphics Processing Unit or GPU) for several years. The JavaScript scripting language can use the resources of the GPU via programming interfaces such as WebGL and the new WebGPU standard. However, this carries risks. Researchers carry out browser attack on Crome, Edge & Co. WebGPU is currently…

Read more

Another cyber attack on the hospital
B2B Cyber ​​Security ShortNews

Hackers have paralyzed the IT system and telecommunications at the Lindenbrunn Hospital in Coppenbrügge (Hameln-Pyrmont district). The unknown perpetrators demanded money to make the systems available again. However, the hospital did not respond to this. How the perpetrators were able to break into the IT systems is being investigated. The hospital reports that patient care is not at risk. However, improvisation is necessary: ​​instead of digital patient files, written files are being created again. “There is currently no indication as to whether patient or resident data is affected,” it says on the hospital’s website. "As part of a…

Read more

Clinic deregistered from emergency care after cyber attack
B2B Cyber ​​Security ShortNews

After a cyber attack, the Dreifaltigkeits Hospital in Lippstadt and two other hospitals are temporarily unable to accept emergencies. After the attack, no one anymore had access to the patient data. “As in other cases, our employees and other experts who are very experienced in these matters are trying to restore the IT systems as quickly as possible,” it says on the hospital’s website. “This necessary process is carried out completely normally and carefully, but requires the time necessary in other cases of cyber attacks. For such cases, there are extensive outage concepts to ensure patient care...

Read more