News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransom Cartel ransomware-as-a-service comes from REvil?
B2B Cyber ​​Security ShortNews

IT security provider Palo Alto Networks and its malware analysis team Unit42 report new findings on "Ransom Cartel" - a ransomware as a service (RaaS) provider that first surfaced in mid-December 2021. Technically, there is overlap with the REvil ransomware. This group of criminals perform dual ransomware attacks and share several similarities and technical overlaps with REvil ransomware. REvil ransomware disappeared just months before the ransomware cartel emerged and just a month after 14 of its suspected members were arrested in Russia. When Ransom Cartel first emerged, it was unclear if it...

Read more

Cost-benefit analysis of IT security 

IT security has a problem: it doesn't make any profits. For many it is still too expensive. However, the benefits of cyber defense can be demonstrated by a cost-benefit analysis with an IT security platform. There are five factors that can do this. Without a doubt, cyber defense causes additional costs beyond the pure license price. Because security software is not only to be obtained and installed quickly. Overtime that takes up time resources can never be ruled out. Its benefits often only become apparent when IT teams are willing and able to work with it. Security must be resource intensive….

Read more

Evaluations of ransomware groups BlueSky and Cuba
B2B Cyber ​​Security ShortNews

Palo Alto Networks, along with its Unit 42 malware analysis team, presented initial research on new ransomware groups: BlueSky Ransomware and Cuba Ransomware. These are the main goals of the attackers. BlueSky Ransomware is a new ransomware family that uses modern techniques to bypass security defenses. Unit 42 found code fingerprints of ransomware samples that can be linked to the Conti ransomware group. BlueSky is also very similar to Babuk ransomware. BlueSky mainly targets Windows hosts and uses multithreading to encrypt files on the host, thus speeding up encryption. Find the full blog post...

Read more

After the first cyber incident, the next one often threatens 
After the first cyber incident, the next one often threatens

Companies that have been the victims of a cyber attack should definitely revise their security strategy because the risk of the hackers striking again within a year is high, as the Data Breaches Survey Report for 2022 shows. Cybersecurity company Cymulate has released its 2022 Data Breaches Survey Report. It is a global survey of 858 senior decision-makers from around the world and from a variety of industries including technology, banking, finance and government. The results make you sit up and take notice and should prompt those responsible in companies to take action. Above…

Read more

Analysis of Raccoon Password Stealer
Bitdefender_News

Bitdefender experts have prepared an analysis of Raccoon Password Stealer. The most amazing thing is that if Russian or Ukrainian is set as the local user language, the malware does not start in the system. Hackers use the RIG Exploit Kit to spread various malware via browser exploits, in particular via vulnerable versions of Internet Explorer 11. Since the beginning of this year, the backers of new attacks have been spreading Raccoon-Stealer malware, which, among other things, uses Chrome- and Mozilla-based access data Applications, access data for mail accounts, credit card information and information on crypto wallets in browser extensions and from a hard drive. Raccoon password stealer since…

Read more

Two-thirds of all attacks using just 4 ransomware strains
B2B Cyber ​​Security ShortNews

A new study by Intel 471 shows that just four types of ransomware – Lockbit 2.0, Conti, PYSA and Hive – were used for almost 70 percent of the recorded incidents. Over 700 attacks were evaluated - the ransomware LockBit 2.0 was the leader with almost 30 percent. Ransomware is a problem that has become increasingly relevant over the years. Countless groups are trying to secure their piece of the cake with different types of ransomware through ever new methods and attack vectors. But as in almost all areas of life, there are those who are more successful…

Read more

The top three ransomware trends of 2021
The top three ransomware trends of 2021

2021 is likely to go down in cybersecurity history as the year of ransomware. The global list of prominent victims ranges from pipeline operators and entire districts to publishers and retail chains. The Varonis Threat Labs have identified three key trends that will also keep us busy in 2022. Because one thing is certain: we will also have to deal with ransomware this year, probably even more and with even more attacks than 2021. Ransomware-as-a-Service A clear shift towards the ransomware-as-a-service business model could be a-Service (RaaS) where groups recruit partners,…

Read more

Spearphishing campaign targets the energy industry
B2B Cyber ​​Security ShortNews

A new spear phishing campaign tries to inject malware into energy companies and their suppliers with cleverly forged e-mails, which are then used to spy out access data. Energy, oil and gas companies and other companies from related industries are currently the focus of a sophisticated phishing campaign, as reported by cybersecurity company Intezer. The campaign, which has been active for at least a year, is intended to smuggle malware into the company's networks, which then spies out user names, passwords and other sensitive information and forwards them to the criminal backers. According to Intezer's security experts, the current cases could be the first ...

Read more

What are cyber criminals doing with the millions of ransom money?
What are cyber criminals doing with the millions of ransom money?

Ransomware washes a fortune into cybercriminals' cryptocurrency accounts. But where does all the money go? A life in luxury? Research by Sophos shows that a lot of money is being invested in further attacks. So whoever pays will also finance the next attack on themselves. Where are the millions of Bitcoins & Co. going that the victims of ransomware attacks pay their extortionists on the assumption that they will get their confiscated data back in this way? At least once there was a hunch: When suspects were arrested in Ukraine who were in ...

Read more

Incident response put to the test
Incident response put to the test

Companies and organizations are under enormous pressure in the event of a cyber attack, because the correct reaction to an incident is time-consuming, but at the same time requires quick action. The incident response experts at Sophos have therefore developed a guide to help companies cope with this difficult task. These four tips are based on the hands-on experience of the Managed Threat Response and Rapid Response teams who have collectively responded to thousands of cyber security incidents. 1. React as quickly as possible When a company is attacked, every second counts. In-house security teams often need to ...

Read more