News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hidden SSL attacks
Encryption SSL https

SSL attacks: After the mass introduction of technologies, security gaps are becoming known that even attackers can exploit perfectly. The encryption technology SSL is no exception to this rule and has shown a large number of published vulnerabilities that force users to switch to new, more secure versions and ultimately to a replacement protocol such as Transport Layer Security (TLS). However, exploiting newly identified vulnerabilities is not the only way SSL is used as a weapon in the hands of malicious attackers. According to Radware, SSL attacks are being used more and more frequently to detect the ...

Read more

DDoS-as-a-Service continues to grow
DDos attack, Radware, DDos-as-a-Service

According to Radware's security specialists, raids, arrests, and server seizures have no significant impact on the growth of DDoS-as-a-Service: illegal booter and stresser services. Such services, also known as DDoS-as-a-Service, are offered by many hackers who use this to market their existing botnets when they are not using them for an attack themselves. They act like normal companies according to market economy criteria. Instead of being advertised in the darknet and on social media in the past, the services are now extensively advertised primarily on common Internet search engines, and strong competition ensures ...

Read more

Ransomware attacks on SMBs
Eset_News

ESET: ransomware attacks target small and medium-sized businesses. IT security has a lot of catching up to do, especially in the SME sector. German medium-sized companies are the engine of innovation in the economy. According to the Federal Association of SMEs, 99,5 percent of companies in Germany are small and medium-sized enterprises (SMEs). They often fail to recognize their importance and neglect the topic of IT security. For this reason, many cyber criminals have adapted their arsenals to precisely these companies. Their attack methods range from Denial-of-Service (DDoS) attacks, which lead to hours of downtime and high revenue losses, to malware attacks, especially with ransomware. Successful blackmail Trojan attacks can ...

Read more