News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Will the next WannaCry-like attack come in 2023?
Will the next WannaCry-like attack come in 2023?

The Kaspersky experts present their predictions in the area of ​​Advanced Persistent Threats (APTs) for the next year: they fear attacks on satellite technologies and mail servers, an increase in destructive attacks and leaks, hacking via drones and a WannaCry-like cyber epidemic. Based on the observations of over 900 APT groups and campaigns The political changes of 2022 will also have an impact on cyber security in the years to come, leading to more complex attacks. The annual forecasts published by Kaspersky are based on research by the Kaspersky Global Research and Analysis Team (GReAT) and...

Read more

Cyber ​​Threat Report reveals new tactics used by cyber gangs
Cyber ​​Threat Report reveals new tactics used by cyber gangs

The threat report highlights significant changes in ransomware gangs and malware campaigns. Deep Instinct's Cyber ​​Threat Report hints at unknown tactics and new victims in 2022. Deep Instinct has released its semi-annual 2022 Cyber ​​Threat Report. The latest edition of the report focuses on the top malware and ransomware trends and tactics from the first half of 2022, providing key insights and forecasts for the ever- (and rapidly) evolving cybersecurity threat landscape. Key Findings of the Report Changes in the structure of cybercriminals Among the most common…

Read more

Hacker group Polonium uses cloud services for attacks
Eset_News

The hacker group POLONIUM (APT) has attacked targets in Israel with previously unknown backdoors and cyber espionage tools. The group mostly uses cloud services for the attacks. The ESET researchers have dubbed the malware "Creepy". The group is said to be working with Iran. According to the analysis by the researchers of the European IT security manufacturer, the hackers have attacked more than a dozen organizations since at least September 2021. The group's most recent action took place in September 2022. Target industries of this group include engineering, information technology, legal, communications, branding and marketing, media, insurance and social services. Hacker group probably with Iran connections according to...

Read more

Iran: Spyware app spies on its own compatriots
Eset_News

An Iranian hacker group spies on their own compatriots with the help of a manipulated app. FurBall spyware, disguised as a translation app, is targeting Iranian citizens. Anyone who downloads apps onto their Android smartphone or tablet should have security software installed if possible. Especially when the desired translation app turns out to be a spy tool - and suddenly personal data changes hands. This is exactly what is currently happening in Iran, according to researchers at the IT security manufacturer ESET. APT-C-50 group Domestic Kitten Apparently the Iranian APT-C-50 group "Domestic Kitten" is running such a campaign. In a translation app, she hides a new version of the…

Read more

BSI ranks Sophos as a Qualified APT Response Provider
SophosNews

After an intensive examination, the Federal Office for Information Security (BSI) included Sophos in its list of qualified service providers in the APT area. The official list of the BSI makes it easier for operators of critical infrastructures to select suitable companies in the field of IT forensic services. After an extensive review process, Sophos is now on the list of qualified APT (Advanced Persistent Threat, or APT) response service providers for KRITIS companies. This overview supports operators of critical infrastructures in identifying suitable service companies that are able to uncover camouflaged cyber attacks that attack a network or system over a longer period of time without much research effort...

Read more

Cyber ​​attack on Frankfurt IT service provider Elabs
B2B Cyber ​​Security ShortNews

Already on August 08.08.2022th, 08.08.2022, the provider of IT services Elabs in Frankfurt/Main had to shut down its systems due to a cyber attack. Again a German provider was hit. It is not known whether data was encrypted or whether a ransom was demanded. The IT service provider Elabs immediately commented on the cyber attack and published a report: “On August XNUMXth, XNUMX, unknown persons carried out a cyber attack on the IT network of the Elabs company. All of the headquarters' IT network systems were then shut down and disconnected from the network in accordance with the emergency plan. The Elabs AG crisis team has informed the security authorities and is currently working with IT experts under high pressure to…

Read more

Ransomware victim: electronics manufacturer Semikron from Nuremberg
B2B Cyber ​​Security ShortNews

As the Semikron Group announced on August 01, 2022, it was the victim of a cyber attack by a professional hacker group. According to Semikron, the systems were partially encrypted. It was not yet known who exactly was behind the attack and whether a ransom was being demanded or paid. The high rate of attacks on large companies or powerful medium-sized companies continues. In particular, the fact that large APT groups offer their ransomware as RaaS - ransomware as a service, causes an increased number of cyber attacks. Now it also has the Nuremberg-based manufacturer…

Read more

Kaspersky Endpoint Detection and Response Expert
Kaspersky Endpoint Detection and Response Expert

The new Kaspersky Endpoint Detection and Response Expert solution offers better detection and investigation and can be used on-premises or via the cloud. The solution is intended to provide more protection against APT attacks and combines individual alerts into one incident. Kaspersky is updating its Endpoint Detection and Response solution, aimed at organizations with mature IT security processes. Under the new name of Kaspersky Endpoint Detection and Response Expert, the solution offers companies additional protection against advanced, APT-like attacks. For better investigation and incident response, alerts are now automatically merged into incidents and rule-based scanning with YARA…

Read more

Remote access Trojan PingPull also attacks financial institutions
B2B Cyber ​​Security ShortNews

New insights from Unit 42 Research: A new, hard-to-detect remote access Trojan called PingPull was recently identified as being used by GALLIUM, an APT (Advanced Persistent Threat) group. It targets telecommunications, government and finance. Unit 42 actively monitors the infrastructure of several APT groups. One of these groups, GALLIUM (aka Operation Soft Cell), has made a name for itself by targeting telecom companies in Southeast Asia, Europe and Africa. The geographic focus, industry focus and their technical prowess coupled with the use of well-known Chinese malware, tactics, techniques and procedures…

Read more

WinDealer malware spreads via man-on-the-side attacks

Kaspersky researchers have discovered that the WinDealer malware is distributed by Chinese-speaking APT actor LuoYu via man-on-the-side attacks Kaspersky researchers discovered a new method used by the actors to spread the WinDealer malware. They use a man-on-the-side attack to read the traffic and insert new messages. The…

Read more