News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Multimodal AI improves cyber defense
Multimodal AI improves cyber defense Image by Ahmed Al-Maslamani on Pixabay

Best detection rates when using multimodal AI: Instead of analyzing individual events, multimodal AI simultaneously examines entire data streams, evaluates images and text, and thus more quickly recognizes complex relationships. Given today's threat landscape, artificial intelligence (AI) is not an option in cyber defense; rather, it is a requirement. But here, too, development must constantly advance to stay one step ahead of cybercriminals in their game of cat and mouse. In this context, Younghoo Lee, Principal Data Scientist at Sophos X-Ops, has demonstrated the effectiveness of multimodal AI for even better detection and classification of spam, phishing, and other threats.

Read more

Report: 300 percent increase in endpoint malware

WatchGuard's latest Internet Security Report shows that malware on endpoints has increased by 300 percent compared to the previous quarter. There's also a return to traditional malware with signature-based attacks. WatchGuard Technologies has published the results of its latest Internet Security Report. Among the key findings of the report for the third quarter of 2024 is that the number of malware detections on endpoints has increased by 300 percent compared to the previous quarter. In this context, the increased number of attack attempts in which...

Read more

Mirai botnet: Analysis of DigiEver vulnerabilities
B2B Cyber ​​Security ShortNews

Security researchers discovered bugs in DigiEver in July 2023 and reported them to TWCERT/CC. DigiEver closed the case in August 2023, citing the device as being five years out of date. Now, in 2025, the vulnerabilities are still being exploited—an analysis reveals. Subsequently, two CVE numbers were reserved for these bugs in mid-December 2023. But the story didn't end there, because in December 2024, it was revealed that a botnet called Hail Cock had exploited one of these bugs, meaning the vulnerability was still open. Unknown versions of DigiEver DVRs were...

Read more

Analysis of BSI-listed APT group Earth Estries
Analysis of BSI listed APT group Earth Estries Image: Bing - AI

The APT group Earth Estries, also known as Salt Typhoon, FamousSparrow, GhostEmperor and UNC2286, which is listed by the BSI as active in Germany, has been analyzed in detail by Trend Micro. The group aggressively targets critical industries around the world in order to spy on them. Since 2023, Earth Estries has developed into one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications companies and government agencies in the US, Asia-Pacific, the Middle East and South Africa. But the German BSI is now also warning about the group, as it has already been active in…

Read more

Qakbot remains dangerous
B2B Cyber ​​Security ShortNews

Sophos X-Ops has discovered and analyzed a new variant of the Qakbot malware. These cases first emerged in mid-December and show that the Qakbot malware has continued to evolve despite law enforcement's successful dismantling of the botnet infrastructure last August. The attackers use even better methods to cover their tracks. The cases analyzed by Sophos X-Ops show that cybercriminals made concerted efforts to strengthen the malware's encryption. This has made it more difficult for defenders to analyze the malicious code. In addition, the attackers are now encrypting the…

Read more

Pikabot: camouflage and deceive
Pikabot: camouflage and deceive

Pikabot is a sophisticated and modular backdoor Trojan that first appeared in early 2023. Its most notable feature lies in its loader's ability to deliver payloads combined with advanced defensive evasion techniques. Using a command and control server, the attacker can take control remotely and execute various commands, including injecting shellcode, DLLs or executable files. The authors of Pikabot have also implemented several anti-analysis techniques to prevent automatic analysis in sandbox and research environments. This includes anti-debugger and anti-VM techniques as well as sandbox environment detection methods. In terms of its campaigns, Pikabot is similar to…

Read more

Pawn Storm under the microscope
Pawn Storm under the microscope

Pawn Storm (also APT28 or Forest Blizzard) is a group of APT actors characterized by persistent repetition in their tactics, techniques and procedures (TTPs). The group is known for still using its decade-old phishing email campaigns targeting high-value targets around the world. Although campaign methods and infrastructure gradually change over time, they still provide valuable information about Pawn Storm's infrastructure, including those used in more advanced campaigns. Trend Micro has the…

Read more

Industrial CyberSecurity with XDR functions
Industrial CyberSecurity with XDR functions - Image by Sarah Sever on Pixabay

Kaspersky has expanded its Kaspersky Industrial CyberSecurity solution to include automated, centralized compliance audit capabilities. In addition, the platform now has expanded Extended Detection and Response (XDR) and Network Traffic Analysis (NTA) capabilities, as well as a new user interface for easier management. According to Kaspersky ICS CERT, malicious objects were blocked on 2023 percent of computers with an Industrial Control System (ICS) in Germany in the first half of 16. To address the increase and complexity of cyber threats targeting industrial computers, Kaspersky Industrial Security now offers additional features...

Read more

Malware HijackLoader uses evasion techniques to attack
B2B Cyber ​​Security ShortNews

The HijackLoader downloader is becoming increasingly popular among threat actors, which is why analysts from the ThreatLabZ team have now examined this malware, which has been appearing since July 2023, in more detail. Due to its modular architecture, the loader is able to use a variety of modules for code injection and execution. Based on Zscaler telemetry data, it can be concluded that HijackLoader poses a high threat potential as it can be used to load various malware families such as Danabot, SystemBC and RedLine Stealer. It uses embedded modules for code injection, which enable flexibility and...

Read more

85 billion threats blocked – an increase of 30 percent
85 billion threats blocked – an increase of 30 percent - Photo by FLY:D on Unsplash

Over 85 billion threats were blocked by Trend Micro in the first half of 2023 - around a third more than in the same period last year. The new trend of cybercriminals using generative artificial intelligence (AI) and ransomware to increase their reach and efficiency is increasing. This is also shown by the Trend Micro 2023 Midyear Cybersecurity Threat Report. Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes its security situation report in the middle of the year. According to this, generative artificial intelligence (AI) is becoming more and more of a threat. Not only companies, but also cyber criminals are increasingly relying on...

Read more