News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Attack on 4.000 databases
Eset_News

“Meow” attacks delete nearly 4.000 unsecured databases. The attackers and their intentions are so far unknown, but they are again showing the risks of inadequate data security. In the past few days, thousands of unsecured databases have been automatically attacked and the stored data has been deleted. The attacks are known as "Meow" attacks because the data is overwritten with the character string "Meow", among other things. In addition, no explanation is left for the data destruction. As a search in Shodan shows, the "Meow" attacks have spread in the past few days. Almost 4.000 databases have now been deleted. More than 97% of attacks ...

Read more

Cyber ​​attacks on Premier League clubs
Eset_News

The ESET security report sheds light on the situation in British sports federations and clubs after cyber attacks. How well is the German Bundesliga prepared? In the English Premier League, a club would have lost almost over a million euros to a successful attack on a manager's email account. The attackers tried to get involved in transfer negotiations and divert the transfer payment to their own account. In another case, there was a successful ransomware attack on all clients and several servers of an English second division soccer team. Surveillance cameras and turnstiles in the stadium were also paralyzed, which almost resulted in a cancellation ...

Read more

Trojans hide in Mac software
Eset_News

ESET researchers analyze malware in trading programs for cryptocurrencies That Mac users are not the target of malware attacks and that cyber criminals have long been considered a wives' tale among experts. ESET researchers have once again uncovered and analyzed cybercrime activities targeting the macOS operating system. The Slovak IT security experts discovered manipulated crypto trading software on fake provider websites. The programs are all clones of a legitimate application that the malicious code distributors have provided with GMERA malware. For this purpose, the criminals misused the well-known Kattana trading software, renamed it and integrated the malware into their installation program. In addition, copied ...

Read more