News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Code packages as a gateway
B2B Cyber ​​Security ShortNews

Security researchers highlight another scam that has become popular among hackers over the past few years. Infected code packages with malicious command lines serve as shock troops. Check Point Software's research department warns all IT security personnel about fraudulent code packages. This scam can be counted among the supply chain attacks and value chain attacks, which have increased significantly. Cyber ​​criminals try to penetrate the systems of entrepreneurs and private individuals in various ways, and code packages are the new vehicle of hackers. Code packages as vehicles Over the last few years, criminals have increasingly misused them for their purposes: either smuggling malicious command lines…

Read more

Defend against identity-based attacks in real time
Defend against identity-based attacks in real time

Identity-based attacks that abuse compromised credentials to access resources are a blind spot in enterprise security defenses. For example, while there are real-time protection solutions against various types of attacks such as malware, malicious data access and its exfiltration, there is no protection against a scenario in which attackers authenticate themselves with valid but compromised credentials. A paradigm shift is therefore required to counter these attacks effectively. User identities must be treated as distinct attack vectors with specific characteristics and properties. This article examines why existing security portfolios fail against identity-based attacks and what measures companies are taking...

Read more