News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Large shipping company CMA CGM meets ransomware attack
SophosNews

With CMA CGM, a French shipping and logistics company based in Marseille, the fourth major shipping company is fighting with the Ragnar Locker ransomware. International corporations seem to be a popular target, as cyber criminals promise a lot of money there. A comment on this from Sophos. With CMA CGM, another large corporation is affected by the cyber criminals behind the Ragnar Locker ransomware. Among other things, Lloyd's List reported that the French shipping company was given a two-day period to contact the hackers via live chat and pay for the decryption code. Chester Wisniewski, Principal Research Scientist at Sophos, has ...

Read more

Linux malware targets VoIP platforms
Eset_News

ESET has discovered that a new type of Linux malware is targeting VoIP platforms and has published an analysis of the Linux malware CDRThief. ESET researchers have discovered previously unknown Linux malware that targets Voice over IP (VoIP) soft switches. The malware was named by the analysts at the European IT security manufacturer CDRThief. The attacked Softswitches Linknat VOS2009 and VOS 3000 both come from a Chinese manufacturer. Softswitches are software that connect and control VoIP phone calls. At the same time, these programs can also be used to bill and manage calls. The novel Linux malware has it ...

Read more

Blackmailers threaten DDoS attacks
Eset_News

Blackmailers threaten even though they have not yet had any DDoS attacks or (data) hostages: Blackmailers threaten financial companies and retailers with DDoS attacks if they do not pay. The blackmailers pose as one of the most notorious APT groups in the world in order to intimidate their victims. In the past few weeks, cyber criminals have blackmailed organizations around the world with threats of distributed denial-of-service (DDoS) attacks, demanding thousands of dollars in bitcoins. The attackers targeted companies from the finance, travel and e-commerce sectors around the world. The ransom demands affect companies in the UK, the United States and ...

Read more

Phishing - This is how an attack works 
Mail attack

Phishing is usually only explained theoretically. Kaspersky experts explain an attack using a live example. An in-depth look at a phishing website and its attempts to disguise itself as an email scanner and use it to lure victims. In recent years, there has been a fairly regular news of email-based corporate network infections (and ransomware-related infections in general). It is therefore no surprise that fraudsters like to use the fear of such attacks to gain access to email credentials for company accounts by tricking company employees into "scanning" their mailboxes. The trick is aimed at ...

Read more

Ransomware: from the victim's point of view
Attack ransomware workplace

The specialist Sophos knows the process and the consequences of a successful ransomware attack only too well. From the victim's perspective: This is how a ransomware attack works. No organization wants to become a victim of cyber crime. But if there are security holes, it is likely that attackers will find them and exploit them. And it can be months or even longer before the victim even notices the condition. So-called incident responders help companies to identify, block and mitigate attacks and their effects. This monitoring by specialists also enables a precise analysis of attack patterns and, as a result ...

Read more

Visa contactless payment tricked
Eset_News

A security loophole makes it possible to bypass the PIN request for a contactless Visa payment. Researchers at ETH Zurich have discovered a vulnerability that allows criminals to make payments with credit cards without knowing their PINs. A team of researchers from the Swiss Federal Institute of Technology in Zurich (ETH Zurich) has found a security flaw in the EMV protocol for contactless payments from the credit card provider Visa that could allow attackers to circumvent the PIN query and commit credit card fraud. With contactless payment, there is usually a limit to how much you can pay for goods or services. As soon as it is exceeded, the card terminal requests ...

Read more

DDoS attacks from the USA and China
Ddos report a10networks

As the new Threat Intelligence Report from A10 Networks shows, most DDoS attacks originate in the US and China. The current report provides information on the countries from which the most common reflected amplification attacks with DDoS attack tools originate and where most of the DDoS botnet agents are hosted. The latest Threat Intelligence Report from A10 Networks shows that the USA and China are the leading countries of origin for Distributed Denial of Service attacks (DDoS). In addition, the results make it clear that DDoS attacks continue to increase in scope, frequency and complexity and that hackers are resorting to increasingly different strategies for their purposes. So ...

Read more

DDoS attacks increase by 200 percent
Notebook attack

Kaspersky experts have registered many attacks. The DDoS summer slump will be in 2020: 217 percent more attacks in the second quarter. This year, according to Kaspersky's latest DDoS report, instead of the usual decrease in DDoS attacks, there is a significant increase in the second quarter. The figures have tripled from the same quarter last year and are even higher than in the first quarter of 2020. Kaspersky experts suspect that this surge in malicious activity is due to the impact of COVID-19, as both cybercriminals and their targets postponed their summer plans…

Read more