News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Zero-Trust Architecture – Opportunities & Risks
Zero-Trust Architecture – Opportunities & Risks Image: Bing - AI

Trust is good, control is better: The Zero Trust architecture turns traditional security models on their head by auditing every access point—a revolutionary strategy that offers opportunities for greater security, but also poses challenges in implementation. The term Zero Trust is not just a technology, but a whole package of measures that pursues an improved security strategy. An interview with answers from Frank Jonas, Head of Enterprise Sales DACH, Kaspersky. 1. Why is Zero Trust a paradigm shift in cybersecurity, and which weaknesses of traditional security models does the concept address? The…

Read more

DeceptiveDevelopment: Attack on software developers
B2B Cyber ​​Security ShortNews

With the "DeceptiveDevelopment" campaign, cybercriminals are specifically targeting software developers looking for jobs. Victims download malware onto their computers along with a test to prove their skills. The criminals aim to obtain login credentials and steal cryptocurrency. ESET researchers have identified a new cyberthreat: In the "DeceptiveDevelopment" campaign, cybercriminals are luring freelance software developers from the cryptocurrency scene into a trap with fake job offers. The goal is to steal cryptocurrency and login credentials. The attacks target Windows, Linux, and macOS users in all regions of the world and use platforms such as LinkedIn, Upwork,...

Read more

Zero-Standing Privileges: Distinguishing Myth from Truth
Zero-Standing Privileges: Distinguishing Myth from Truth

What can the Zero Standing Privileges (ZSP) principle do and what is a myth? ZSP is an important component in identity security. However, its capabilities are often overestimated. Companies always need a comprehensive range of controls to adequately secure their complex hybrid and multi-cloud environments. When it comes to zero standing privileges, there are some myths to be aware of and some realities that are crucial to building a forward-looking Privileged Access Management (PAM) program. Knowing these myths and realities is important for companies to make informed decisions and implement effective security measures. CyberArk lists three of the most common...

Read more

Phishing campaign: Target Azure Cloud credentials
B2B Cyber ​​Security ShortNews

Unit 42 researchers have uncovered a phishing campaign targeting European companies, including those from Germany. The campaign aimed to steal Microsoft Azure cloud credentials and take over the victims' cloud infrastructure. The campaign's phishing attempts peaked in June 2024, created as fake forms using the HubSpot Free Form Builder service. Our telemetry data shows that the threat actor successfully targeted around 20.000 users across various European companies. Phishing campaign started as early as June 2024 Our investigation found that while the phishing campaign appears to have been launched in…

Read more

LLM Jacking Attacks: Alarming Increase
B2B Cyber ​​Security ShortNews

As LLMs (Large Language Models) increase, so does the threat of LLM jacking attacks. Cybercriminals use stolen cloud login data to illegally gain access to LLMs. Companies should therefore strengthen their security measures and secure their access data. Since the discovery of LLM jacking by the Sysdig TRT, attacks have increased significantly. Attackers use stolen login information to gain access to expensive AI models and use them for their own purposes. This can cost victims enormous sums of money, as modern LLMs such as Claude 3 Opus can charge up to $100.000 per day in usage fees...

Read more

Protecting Android mobile devices with passphrases
Protecting Android mobile devices with passphrases

Passphrases are longer and more complex than simple passwords. They can be easily created using a passphrase generator. A leading provider of zero-trust solutions has now expanded its passphrase generator for Android mobile devices. Keeper Security is adding a passphrase generator to its mobile platform. This new functionality is now available for Android devices and helps users develop strong and unique login credentials for their accounts. This is a response to the growing risks posed by sophisticated cyber threats. Passphrase for iOS will be available in the coming weeks. Passphrases are harder to…

Read more

Phishing: Cybercriminals imitate payment service Zelle
Phishing: Cybercriminals imitate payment service Zelle

Financial service providers are increasingly falling victim to third-party phishing campaigns. The latest victim is the payment service Zelle. Criminals steal personal data by directing their victims to fake payment service websites. The rise of third-party phishing is extremely worrying, as it not only targets traditional targets, but also the users of various financial institutions. The investigation by security researchers at BlueVoyant sheds light on the sophisticated methods used by cybercriminals to steal users' personal information and login details. Background of the phishing campaign Zelle, a widely used digital payment service, is at the center of these fraudulent activities. The attackers…

Read more

Data offering: Every third company appears on the dark web
Every third company appears on the dark web

In the last two years, one in three companies worldwide have offered compromised data for sale on the dark web. The sale of access data to the company's infrastructure poses a major threat. In total, between January 2022 and November 2023, Kaspersky Digital Footprint Intelligence discovered around 40.000 messages in forums, blogs and Telegram shadow channels that revolved around the trading of internal company databases and documents . Sales of access data on the Darknet increased by 16 percent. However, in some news, access to company infrastructures was also offered. More than 6.000 such messages identified the…

Read more

Cyber ​​risk Social engineering challenges companies
Cyber ​​risk Social engineering challenges companies

Social engineering is a major security risk. Cybercriminals steal credentials from individuals via mobile phishing attacks and infiltrate company infrastructure. Using personal mobile devices for work creates a major gap in security visibility. Security teams in companies are currently facing various challenges when it comes to threat monitoring, i.e. monitoring possible threats. Sascha Spangenberg, Global MSSP Solutions Architect at Lookout, explains the recent changes in attacker behavior: In the past, attackers have attempted to gain access to the infrastructure directly through vulnerabilities or using brute force methods. These attacks are…

Read more

Threat Hunting Report 2023: Identity-based attacks are on the rise
B2B Cyber ​​Security ShortNews

The new Threat Hunting Report considers attack trends and tactics between July 2022 and June 2023. Key findings of the report include: The average breakout time – the time it takes attackers to move laterally from a victim's environment moving compromised host to the next – hits a new low of 79 minutes (up from 84 minutes in 2022). The shortest breakout time of the year was a record time of just 7 minutes. Credential Abuse Attackers are increasingly using identity-based attacks: 62 percent of interactive…

Read more