News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Gootloader: Banking Trojan mutates into malware platform
SophosNews

“Gootkit” becomes “Gootloader”: Banking Trojan mutates into a complex malware platform with multiple attack vectors. The Gootkit malware family is a well-known henchman - a Trojan that initially focuses on the theft of banking business data and today uses the Cobalt-Strike analysis tool, the Kronos banking malware and the REvil ransomware, among other things. IT security experts have already dealt intensively with the malware and, in particular, with its clever transmission mechanisms in 2020. What is new is that the attackers have expanded the malware into a multi-payload platform. With variable attack mechanisms - including social engineering - it is strongest in Germany today ...

Read more

Misconfigurations invite cyber criminals
Misconfigurations invite cyber criminals

Misconfigurations open the door to the network for cyber criminals. A risk analysis of all endpoints can help to sharpen the focus on these weak points. Armed with this information, IT security can proceed to eliminate the risks. The threat landscape is serious and organizations are facing more attacks from cyber criminals. These are also becoming more and more dangerous and sophisticated because the attackers are constantly using new attack vectors or more advanced technologies such as machine learning. At the same time, the attack surface through cloud computing and the workforce distributed in the home office is constantly increasing and is more difficult to keep track of. No wonder,…

Read more

BSI publishes VeraCrypt security analysis
B2B Cyber ​​Security ShortNews

On behalf of the Federal Office for Information Security (BSI), the Fraunhofer Institute for Secure Information Technology SIT examined the security of the VeraCrypt encryption software. VeraCrypt is open source encryption software for Windows, Linux and macOS. The software enables the encryption of an entire hard drive and the creation of encrypted containers. VeraCrypt is the successor to the well-known encryption software TrueCrypt, the development of which was unexpectedly discontinued in 2014. VeraCrypt: No Vulnerabilities Identified The VeraCrypt investigation did not identify any serious vulnerabilities. However, in several areas (e.g. in the development process and on the subject of code quality) there was potential for improvement ...

Read more

Germany extremely attractive for hackers 
B2B Cyber ​​Security ShortNews

Cyber ​​attacks are one of the greatest threats to the economy. In the course of this, IronHack took an interest in which countries are particularly attractive for hackers and cyber criminals and carried out the following analysis. The result shows that, after the United States, Germany is the country most threatened by cyber criminals. A finding that corresponds with the risk assessments of proven experts. "Almost half of all companies in Germany (46 percent) reported cyber attacks on their company in the past few months," reported the Alliance of Germany in the course of the publication of the DsiN-Praxisreport Mittelstand 2020 in ...

Read more

Kaspersky Threat Intelligence Portal with API integration
Kaspersky THREAT INTELLIGENCE PORTAL

The free version of the Kaspersky Threat Intelligence Portal offers registered users new, extended functions via community access. Thanks to an API integration, your own applications can now be connected to the service. In addition, Kaspersky Cloud Sandbox provides a way to get a limited number of full reports on the behavior of a file or URL. In order to increase data protection, a special transfer mode has also been introduced, which allows files to be checked in such a way that the results are not available to others, with the exception of Kaspersky. Threat Intelligence Offering Investing in Threat Intelligence ...

Read more

Employees overestimate knowledge
Way guidance training

Home office and IT security: employees make 90 percent of mistakes because they are convinced that they are doing the right thing. Kaspersky training clearly shows that employees time and again overestimate their own knowledge. The free security training from Kaspersky and Area 9 Lyceum shows that employees overestimate their knowledge of IT security: although correct answers were given in two thirds of cases (66 percent), nine out of ten cases received the answer was wrong, but the employees are still convinced of their knowledge. The use of virtual machines, software updates and the reasons ...

Read more

Sandboxing: better control of attacks
sandboxing

Kaspersky sandboxing technology can now also be used in customer networks. The new on-premise solution Kaspersky Research Sandbox is aimed at organizations with strict data sharing restrictions. With the sandbox technology, users are now able to set up internal security operations centers (SOCs) or computer emergency response teams (CERTs). The solution supports corporate security experts in discovering and analyzing targeted attacks, while at the same time ensuring that all scanned files remain within their own organization. Last year around half of the companies (45 percent) experienced a targeted attack ...

Read more

Analysis results of the Kaspersky Threat Intelligence Portal
Analysis

Many requests submitted as links or files to the Kaspersky Threat Intelligence Portal turn out to be Trojans (25 percent), backdoors (24 percent) and Trojan droppers (23 percent) Almost three quarters (72 percent) of the malicious files analyzed, that were submitted via the free version of Kaspersky Threat Intelligence Portal were Trojans, backdoors or droppers. Analysis of the submitted data also shows that the types of malware that researchers investigate most often do not necessarily match the most widespread ones. The detection of harmful activities is only the starting point for ...

Read more