News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

South Westphalia IT cyber attack: 72 municipalities still paralyzed
B2B Cyber ​​Security ShortNews

A cyber attack with ransomware took place on the IT service provider Südwestfalen-IT on October 30.10.2023, 72. Among other things, the provider supplies 2 municipalities with IT services, which have been completely paralyzed for almost two weeks. Now there are initial findings – although not particularly good ones. The IT provider SIT – Südwestfalen-IT informs all customers and communities about the progress of the cyber attack with ransomware via an emergency website. Those affected include the 72 member municipalities from the association area in South Westphalia, including the districts of Hochsauerlandkreis, Märkischer Kreis, Olpe, Siegen-Wittgenstein, Soest and several municipalities in the Rheinisch-Bergisches Kreis. Around the…

Read more

Hacker attack: Karlsruhe University of Applied Sciences completely paralyzed
B2B Cyber ​​Security ShortNews

The next university was the victim of a hacker attack: this time Karlsruhe University is the victim and is completely paralyzed. Furtwangen University (HFU) has already been affected in the last few months. The Kaiserslautern University of Applied Sciences was hacked back in July and, according to the attacker, over 240 GB of data was stolen. The Baden-Württemberg Cooperative State University also fell victim to an attack at the end of September. According to Karlsruhe University of Applied Sciences, an anomaly in the IT infrastructure was discovered on October 02nd. As a result, a crisis team was immediately activated. Knowing that cyber attacks are already occurring across the country...

Read more

Threat Report: Decoy Dog Trojan targets businesses
B2B Cyber ​​Security ShortNews

Decoy Dog is anything but an ordinary Trojan. After his discovery in April 2023, he again changed his malware tactics. The hackers took action to continue maintaining access to already compromised devices. The attacker can be safely outmaneuvered via DNS recognition algorithms. The second Infoblox Threat Report on the Decoy Dog Trojan includes extensive updates. Decoy Dog is a Remote Access Trojan (RAT) discovered in April 2023. This malware uses the Domain Name System (DNS) to establish command-and-control (C2) communication and is suspected of…

Read more

Cloud defense system against DDoS tsunamis
Cloud mitigation system against DDoS tsunamis - Photo by Omar Flores on Unsplash

Radware presents a new cloud web DDoS protection solution against so-called tsunami attacks. The state-of-the-art solution is designed to bridge the growing gap between standard DDoS mitigation and a new breed of more aggressive Layer 7 (L7) HTTPS flood attacks – also known as web DDoS tsunami attacks. Radware's solution has the ability to combat encrypted, high-volume, and vectorial threats that bypass standard web application firewalls (WAF) and network-based DDoS tools, essentially rendering them ineffective. “The dramatic rise in web DDoS tsunami attacks poses an imminent cyber threat. Organizations around the world, regardless of industry,…

Read more

DACH: 55 percent victims of spear phishing
DACH: 55 percent victims of spear phishing

In the DACH region, 55 percent of companies have been victims of a spear phishing attack in the last 12 months, according to the new Barracuda Networks Spear Phishing Trends Report 2023. DACH was thus slightly above the average in an international comparison (50 percent). In addition, 24 percent of all companies had at least one email account affected by an account takeover. Cyber ​​criminals send an average of 370 malicious emails from each compromised account. The report includes Barracuda spear phishing data and analysis based on a dataset covering 50 billion emails across 3,5 million mailboxes, including nearly 30 million spear phishing emails. In addition…

Read more

E-mail attacks: HTML attachments most dangerous
E-mail attacks: HTML attachments most dangerous

HTML attachments are still the most dangerous file type in email attacks. As a result, attackers are relying more on HTML attachments: their share has doubled in a year, according to Barracuda Networks. Hypertext Markup Language – HTML for short – is used to create and structure content presented online. This often happens in e-mail communication as well. But one can assume that practical, well thought-out technologies are usually also very popular with criminals. And in fact, HTML is an overly welcome attack tool in phishing, for example to disguise the theft of login data. Even more:…

Read more

Companies are silent about notifiable attacks
Companies are silent about notifiable attacks

Every third person responsible for cyber security in a company has already been instructed to conceal a reportable attack. The study shows: 14,7 percent then concealed the incident. The global Bitdefender 2023 Cybersecurity Assessment Report proves that GDPR, GDPR and other regulations are too often broken in favor of a good image. Bitdefender has published its 2023 Cybersecurity Assessment Report. The report is based on an independent and anonymous survey of more than 400 IT and cybersecurity professionals from IT manager to CISO in the US, UK, Germany, France, Italy and Spain in companies...

Read more

Rhein-Pfalz district: 1,7 million ransomware damage
B2B Cyber ​​Security ShortNews

As early as October 2022, the administration of the Rhein-Palatinate district was hit by a cyber attack. Since the ransom was not paid, all damage had to be repaired. Now the bill is on the table: 1,7 million euros. And data also ended up on the dark web. Prevention is better than aftercare - the administration of the Rhine-Palatinate district has now noticed that. After the administration was hit by a ransomware attack, nothing worked because of the encrypted systems. The administration had landed back in the analog age within a few days. Even the phones didn't work. Damage balance 1,7 million euros...

Read more

Caught: Black Basta structure X-rayed
Caught: Black Basta structure X-rayed

The security provider Quadrant managed to follow a Black Basta attack live and to evaluate the technical background. The experts do not know the processes at Black Basta, but have also uncovered the loopholes, which can now be monitored. This is a heavy blow for the entire structure of Black Basta, which can no longer be used in this way. Quadrant recently assisted a customer in an enterprise-wide compromise by the Black Basta ransomware group. This group is a ransomware-as-a-service (RaaS) organization known to target mid-sized and large enterprises...

Read more

Is HIVE behind the attack on the Potsdam administration?
B2B Cyber ​​Security ShortNews

It is not yet entirely clear whether HIVE is behind the cyber attack on the Potsdam administration. A message from the administration speaks of HIVE and that even after the APT group has been broken up, the systems are still being switched off. The misery does not end for the city administration of Potsdam. Although the IT experts restarted the attacked and then repaired systems in January, they shut everything down again on January 24th. After an expanded virus scanner was activated, there were a large number of automated communication attempts from the state capital's internal network...

Read more