News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Phishing, vishing and quishing
Phishing, vishing and quishing

In the early days, phishing attacks were often very simple and used legitimate sources of written communication such as email to gain access to sensitive data. In the age of AI, it is tempting to consider how attackers are modernizing their phishing methods. With the growing popularity of GenAI tools, voice-based phishing attacks – also known as “vishing” – have become the new norm and the evolution of attack methods continues. Phishing as a springboard To understand the importance of phishing in the malware industry, it helps to look at the anatomy of a...

Read more

Threat report for the second half of 2023
Threat report for the second half of 2023

A cybersecurity AI provider has released its End of Year Threat Report for the second half of 2023. The report is based on data from the entire customer base and uncovers important developments in the areas of multi-functional malware, loaders, ViperSoftX and phishing emails. According to Darktrace's analysis, in the second half of 2023, the most commonly observed threat type was Malware-as-a-Service (MaaS), which, along with Ransomware-as-a-Service (RaaS), accounted for the majority of malicious tools used in cyberattacks made up. Due to high demand and repeat subscription-based revenue, Darktrace expects the…

Read more

Microsoft abused for phishing
B2B Cyber ​​Security ShortNews

The research department of a cyber security solutions provider has published the Brand Phishing Report for the fourth quarter of 2023. The report highlights the brands most frequently imitated by hackers to steal personal information, user account information or payment data in October, November and December 2023. Microsoft was at the top with 33 percent and overall the technology sector was the most abused industry as Amazon came second with 9 percent, Google third with 8 percent and Apple with 4 percent. “As we move forward from 2023…

Read more

Cybersecurity: The vulnerable employee needs support
Cybersecurity: The employee vulnerability needs support - AI MS

In the changing threat landscape, human behavior plays an important role in cybersecurity - on the one hand, positively as a reinforcement in defense, on the other hand, negatively as a door opener for cybercriminals. A difficult balancing act. But there are effective solutions to better support employees. Security technologies are constantly evolving - and with them the tactics of cybercriminals who exploit vulnerabilities in machines and people to gain unauthorized access to systems. In the first half of 2023, the Sophos Cybersecurity Report found that compromised credentials were the primary cause of 50 percent...

Read more

Perfidious cyber attacks on hotels
SophosNews

Criminals are increasingly exploiting the well-meaning service spirit of hotel employees: Sophos X-Ops has uncovered several cases of a “malspam” campaign targeting hotels around the world. Access comes via phishing and also threatens the guests' data. The attacks using the RedLine Stealer malware, which specializes in skimming access data, have currently been detected in Spain, France, Germany, Switzerland, the United Arab Emirates and the USA. Phishing through fake complaints... The attackers first report with complaints about serious problems that the sender supposedly has with...

Read more

Phishing: Extremely high number of malicious emails with Adobe InDesign links
B2B Cyber ​​Security ShortNews

A new phishing scam is on the rise that abuses Adobe InDesign and uses it to distribute malicious links. Apparently the campaign was so successful that Barracuda saw an increase in said phishing emails from 75 to 2.000 per day. Phishing attacks are becoming increasingly sophisticated, using various methods to evade detection and trap victims. There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. Increase by a factor of 30: Phishing with Adobe InDesign links According to Barracuda telemetry, the…

Read more

Cyberattacks 2024: New attack tactics
Cyberattacks 2024: New attack tactics

Constantly changing, new attack tactics and techniques to specifically exploit human weaknesses will challenge IT security managers in 2024. IT security professionals are facing another challenging year. Cybercriminals are constantly refining their attack tactics, techniques and procedures (TTPs), demonstrating their ability to rapidly evolve and implement new, complex attack chains. At the heart of this development is a crucial shift: cybercriminals are targeting digital identities rather than technical vulnerabilities. Even though TTPs and goals change, one aspect remains constant: people and their identities are the most...

Read more

Phishing kits are evolving
B2B Cyber ​​Security ShortNews

The ongoing evolution of phishing kits, commonly known as “scamas,” reveals a worrying dynamic where even beginners have the opportunity to become highly skilled fraudsters. This fascinating development is reflected not only in the increasingly sophisticated features of these kits, but also in their clever marketing within the dark web. It becomes clear that the technological sophistication of these fraudulent tools extends not only to their range of functionality, but also to how cleverly they are promoted and distributed in the shadows of the Dark Web. According to Vade Secure’s findings…

Read more

Phishing attacks are becoming more sophisticated
Phishing attacks are becoming more sophisticated

Phishing attacks have become a serious threat in today's digital era. A study from GetApp not only looks at the increasing frequency and impact of such attacks, but also takes a look at how well managers are prepared for this threat and what measures they are taking. The focus of the study is on the experiences of managers in Germany who have experienced at least one phishing attack. When asked how worrying phishing attacks are, 23% of executives see serious risks. The majority (87%) of respondents believe that…

Read more

Phishing via Google
B2B Cyber ​​Security ShortNews

Over the last few months, hackers have repeatedly been observed exploiting the online services of well-known hyperscalers such as Google to make phishing emails appear legitimate. The abused services included PayPal, Microsoft SharePoint, AWS, Facebook Ads and various Google services such as Google Looker, Google Collection and Google Ads. With Google Groups, CPR has now identified another application from the global tech company that is being used for phishing spoofs. From the perspective of hackers, Google tools are particularly inviting for data theft because Google services are free and easy to use. Google also has a variety of tools:…

Read more