News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyberattacks via API
Cyberattacks via API

In the first month of 2024, the frequency of API attacks has increased, affecting an average of 1 in 4,6 companies per week - a 20 percent increase from January 2023. This upward trend, reported by Check Point Research in the Check Point ThreatCloud AI Data observed highlights the urgent need for robust API security strategies. Significant increase in attacks: In the first month of 2024, 1 in 4,6 companies worldwide were affected by attacks on web APIs each week, a 20 percent increase compared to January 2023 and the growing…

Read more

Cybergangsters: Telegram bots bypass ChatGPT restrictions
B2B Cyber ​​Security ShortNews

Check Point Research (CPR) security researchers found that cyber criminals use Telegram bots to bypass ChatGPT restrictions on underground forums. The bots use OpenAI's API to create malicious emails or code. Chat bot makers currently give up to 20 free queries, but then charge $5,50 for every 100 queries. CPR therefore warns of ongoing efforts by cybercriminals to circumvent ChatGPT's restrictions in order to use OpenAI for malicious purposes. Telegram ChatGPT Bot-as-a-Service CPR found advertisements for Telegram bots on underground forums. The bots use the API…

Read more

Hardware, API Server, and Container Risks with Kubernetes
Hardware, API Server, and Container Risks with Kubernetes

Kubernetes is extremely popular, but without proper security measures, it also comes with risks. Security expert CyberArk names three specific risks and shows which defensive measures are required to get hardware, API server and container risks in Kubernetes under control. In software development today, speed and agility are key. Container technology is being used to an increasing extent. Kubernetes has emerged as the de facto standard for managing containerized workloads and services. Security Considerations in Kubernetes From a security perspective, the Kubernetes orchestration platform brings with it specific identity-related challenges that need to be addressed early in the development process. Otherwise...

Read more

API sprawl: High costs and security risks 
F5 news

The rapid proliferation of APIs (interfaces) and the associated governance and security risks could spiral out of control. The F5 study “Continuous API Sprawl: Challenges and Opportunities in an API-Driven Economy” warns of this. According to this, there are currently around 200 million APIs that are used for Internet applications ranging from digital payments to online entertainment to the smart home. By 2030, that number could rise to 1,7 billion. From 200 million APIs to 1,7 billion Even more problematic than growth is the widespread distribution of APIs without common standards, strong governance, or sufficient focus...

Read more

F5 improves security of apps and APIs
F5 improves security of apps and APIs

F5 improves the security of apps and APIs for modern digital offerings. The new SaaS products ensure the security of applications: Device ID and Shape Recognize use unique data and analysis functions that eliminate login problems and at the same time protect against fraud. The new offers also strengthen the technological leadership position of F5. The company combines multi-cloud security and deployment for applications with protection technologies against bots and fraud. This protects companies and people from current threats. APIs are always a target for hackers "APIs play an essential role in the reach of digital offerings for companies every ...

Read more

IT security challenges in 2021

The year 2020 has shown more than ever that the increasing dependence on the Internet and cloud services requires a greater degree of adaptability and increased internal collaboration between different IT departments and departments. Angelique Medina, Director at ThousandEyes, has taken a closer look at the individual developments and gives an assessment of the IT security challenges in 2021. Trouble-free and reliable internet connections played a central role in 2020 for companies that are increasingly relying on cloud services and home offices. To the chagrin of many companies, it quickly became clear that the Internet is a fragile and complex ...

Read more