News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

US agency CISA takes Ivanti devices offline
B2B Cyber ​​Security ShortNews

The American Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency order calling on all federal agencies to take Ivanti devices offline. The background to this measure is the discovery of security gaps in network products from the manufacturer Ivanti. The “Ivanti Connect Secure” and “Ivanti Policy Secure” products are affected. CISA published conditions that must be met before the US manufacturer's devices are allowed back on the network. This includes resetting to factory settings and updating to a bug-fixed version. Passwords and certificates also have to be reissued. CISA writes on…

Read more

After home office: Management of mobile devices in companies 
After home office: Management of mobile devices in companies

As a result of the pandemic, IT administrators around the world have faced numerous new challenges. The rapid shift to remote working has brought with it entirely new security risks and threats that were previously unthought of. Many mobile devices are now returning to the office. Companies should have a good strategy for this. 5 Mobile Device Management Best Practices from Beyond Identity. Now it's time to review mobile device management practices. While many companies are bringing their employees back into the office, a significant number of them continue to be completely...

Read more

Spyware Pegasus: Protect mobile devices from high-end malware
Spyware Pegasus: Protect mobile devices from high-end malware

Only recently did the world learn of Pegasus spyware, which primarily targeted journalists, politicians, human rights activists and defenders, and lawyers. Protecting yourself completely from such professional surveillance software is almost impossible. However, users can take certain measures that make it difficult for attackers to target them. Kaspersky experts give tips. Costin Raiu, head of the Global Research and Analysis Team (GReAT) at Kaspersky, has now compiled top-level recommendations on how mobile users of Android and iOS devices can protect themselves against Pegasus and other high-end mobile malware. spy ware...

Read more

Log4j alarm: what Sophos recommends
Log4j Log4shell

Java vulnerability Log4j - Log4Shell - What happened and what should be done now. After Hafnium, Kaseya or Solarwinds, companies urgently need to grapple with a high-profile server vulnerability called Log4j - Log4Shell. Sophos clarifies the most important facts and tells you what to do. The name Log4Shell refers to the fact that the exploited bug is contained in a popular Java code library called Log4j (Logging for Java), and to the fact that if attackers successfully exploit the vulnerability, they practically get a shell - that is, the opportunity , any system code of your choice ...

Read more

DDos: Hackers bring websites to their knees 
DDos: Hackers bring websites to their knees

When hackers bring websites to their knees: best practices against DDos attacks. Cyber ​​criminals use distributed denial of service (DDoS) attacks to target companies and institutions by causing server or web services to fail. For example, attackers bombard the IP address of a website with so much data traffic that the website and every web server connected to it is overwhelmed with answering the queries. This makes the website inaccessible for users. DDoS hacker attack: simple but effective For attackers, DDoS is a simple, effective and powerful technology that is fueled by insecure devices, especially the steadily growing Internet of Things (IoT)….

Read more