News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Machine learning in cybersecurity
Machine learning in cybersecurity

For a dynamic and powerful security platform, machine learning (ML)-based tools can be an essential element. The technology can be used in a variety of tasks, such as detecting malware and network anomalies, categorizing user behavior, prioritizing vulnerabilities and threats, and also accurately predicting future attacks. Additionally, their use can help improve model risk, streamline threat classification – and even accurately predict immediate and potential attacks. In addition, ML-based automation relieves employees by minimizing manual effort. So ML has a lot…

Read more

How Medusa Ransomware works
B2B Cyber ​​Security ShortNews

Research team Unit 42 has released a new research report on the Medusa ransomware gang, revealing the threat actors' tactics, tools and procedures. Unit 42 noted an escalation in Medusa ransomware operations and a shift in tactics toward extortion, marked by the launch of a dedicated leak site (DLS) called Medusa Blog in early 2023. Medusa threat actors use this website to publish sensitive data of victims who are unwilling to meet their ransom demands. As part of their multi-extortion strategy, this group offers victims multiple options when their data is on…

Read more

CISOs in 2024
CISOs in 2024

What do CISOs think will happen in 2024? One is Sergej Epp, Chief Information Security Officer (CISO) for Central Europe at Palo Alto Networks. He presents his seven predictions for CISOs in 2024. In addition, the expert provides practical recommendations for action for each of these developments that companies can use to specifically protect themselves against new threats. Prediction 1: AI will challenge CISOs In the future, companies and IT departments will have difficulty defining the exact responsibilities for artificial intelligence (AI) in the company. At the same time, attackers are using Large Language Models (LLMs) and…

Read more

Connect IoT devices securely
Connect IoT devices securely

As the number of IoT devices increases, so does the risk of attack from known and unknown threats. The 2023 IoT Security Benchmark Report shows how organizations are using advanced IoT security to protect connected devices. The number of connected IoT devices will continue to grow in the coming years, reaching an average of over 2025 devices per company by 9.000. Unfortunately, most existing IoT security solutions do not have any built-in prevention or enforcement measures. They often use legacy, signature-based detection methods that focus on known devices. Inadequate IoT security has been a factor in several spectacular security incidents in the...

Read more

Consolidation for comprehensive cloud security
Consolidation for comprehensive cloud security

Using cloud technologies to drive innovation, streamline processes, and stay competitive comes with challenges. This is especially true for maintaining a robust and consistent security structure in an increasingly complex digital environment. The rapid adoption of cloud technologies and digital transformation initiatives have prompted many organizations to seek point solutions to solve specific cloud security problems. This often leads to tool proliferation, Palo Alto Networks observes, which introduces another set of challenges that hamper the ability to manage cloud security...

Read more

Trends in Managed Detection & Response (MDR)
Trends in Managed Detection & Response (MDR)

MDR vendors help IT and security leaders accelerate the development of their security program and improve security posture. With no end in sight to the cybersecurity skills shortage, MDR Services can immediately deploy expert resources along with proven best-of-breed processes and tools. These help security teams gain control and arm themselves for the future success of security programs. To understand these trends and assess the overall state of MDR service offerings, ESG conducted a survey of 373 cybersecurity professionals on behalf of Palo Alto Networks. MDR engagement What causes IT and…

Read more

Attacks using Web3 IPFS technology
B2B Cyber ​​Security ShortNews

IPFS is a Web3 technology that decentralizes and distributes the storage of files and other data on a peer-to-peer network. Like any technology, IPFS can be misused by cybercriminals. However, since the content hosted on IPFS is decentralized and distributed, it is difficult to find and remove dangerous content from the ecosystem. What are Web3 and IPFS? IPFS is one of the technologies supporting Web3 infrastructures. Web3 – or the third iteration of the web – is a new version of the internet that uses blockchain technology and tokens to achieve decentralization in…

Read more

Cloud-native security
B2B Cyber ​​Security ShortNews

As cloud infrastructure becomes more important, securing it has become a key issue for government agencies. Therefore, implementing cloud-native security is a key focus. Vulnerabilities in cloud systems and environments expose government agencies to similarly serious threats given the potential uses and the volume and sensitivity of data, Palo Alto Networks reports. The ongoing cloud trend makes this area of ​​risk even more serious. Several factors have driven the accelerated migration to the cloud, including significant technological advances, the impact of COVID on the delivery of...

Read more

Response time after alarm: 4 days and more!  
Response time after alarm: 4 days and more!

The Cloud Threat Report Volume 7 reveals: After an alert for a security team, attackers have up to 40 days to carry out their attack in 4 percent of cases. Attackers are helped by the 60 percent unpatched high or critical vulnerabilities. The cloud attack surface is as dynamic as the cloud itself. As organizations around the world increasingly share, store, and manage data in the cloud, the attack surface for businesses is expanding exponentially. This expansion often happens in unknown, overlooked, or poorly secured ways. For attackers, every workload in…

Read more

Creative scams using chatbots
B2B Cyber ​​Security ShortNews

The dark side of ChatGPT's popularity is that it also draws the attention of scammers who try to profit from using phrases and domain names that appear related to the site. Between November 2022 and early April 2023, Unit 42 saw a 910% increase in monthly registrations for ChatGPT-related domains. Unit 42 also observed a 17.818 percent growth in related squatting domains from DNS security logs during this period. Unit 42 also recorded up to 118 detections per day of malicious URLs related to ChatGPT, which…

Read more