News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Danger for industry: One in six industrial PCs attacked
Danger for industry: One in six industrial PCs attacked - Image by Gerd Altmann on Pixabay

Industrial companies in Germany are still in the attackers' sights. This is also shown by an analysis by Kaspersky: more and more PCs used in industry are affected by cyber threats and have had to fend off attacks. Every sixth device was affected. In 2023, Kaspersky's ICS security solutions blocked malicious objects on 18,3 percent of industrial computers in Germany; this corresponds to a slight increase compared to the previous year (15,1 percent). The majority of threats were denylisted Internet resources (5,8 percent), malicious scripts and phishing sites (6,1 percent), and malicious documents (1,5 percent). It went…

Read more

XDR analysis: When and where do attackers usually knock?
EDR analysis: When and where do attackers usually knock? Image by Tung Lam on Pixabay

Barracuda security researchers analyzed the top Extended Detection and Response (XDR) detections of 2023, based on proprietary data supported by a 24/7 Security Operations Center (SOC). The results reveal the most common ways attackers tried – and failed – to gain persistent access to networks. In 2023, 66.000 high-risk threats were detected that were serious enough to require referral to SOC analysts for investigation, and an additional 15.000 that required urgent, immediate response. Both threat categories saw a steady increase throughout the year, peaking in October, November and December…

Read more

Cybersecurity analysis: What structure does the company use?

The company's organizational structure has far-reaching effects on its cybersecurity. Based on a survey, Sophos examines three organizational scenarios and assesses their effectiveness in cybercrime defense. A dedicated cybersecurity team as part of the IT organization achieves the best results. But not every company has that. Finding trained and experienced specialist staff is one of the major challenges in companies to ensure cybersecurity. Given this discussion, it is therefore particularly important to enable the few available specialists to achieve the greatest possible impact in defending against cyber risks. In this…

Read more

SMEs in sight: cyber attacks on supply chains

Partnerships, services, customer relationships – no organization operates independently. Contracts, compliances and laws regulate cooperation, but what about security criteria? Cyber ​​attacks on supply chains particularly affect small and medium-sized companies, according to the latest threat report from Sophos. In the latest Sophos Threat Report: Cybercrime on Main Street, the security experts report that in 2023 the Sophos MDR team responded increasingly to cases in which companies were attacked via the so-called supply chain, i.e. the supply chain in business and in the IT infrastructure became. In several cases, the vulnerabilities lay in the remote monitoring and management software...

Read more

Why cybercriminals specifically target backups
Why cybercriminals specifically target backups AI - MS

There are two main ways to recover encrypted data after a ransomware attack: restoring from backups and paying the ransom. The attackers also know this and try to deprive companies of a solution by attacking backups. Two problems, same cause: Complete recovery of data after a ransom payment is highly uncertain, because in case of doubt you cannot rely on a promise from cybercriminals. And restoring the data from the backups doesn't work in many cases because the cybercriminals have often encrypted them in order to...

Read more

Report: More Email Server Attacks and Evasive Malware
Report: More Email Server Attacks and Evasive Malware MS-AI

WatchGuard Internet Security Report documents a dramatic increase in so-called “evasive malware,” contributing to a significant increase in overall malware volume. Also noticeable are increased attacks on email servers. WatchGuard Technologies has released the latest Internet Security Report, in which WatchGuard Threat Lab experts highlight the top malware trends and threats to network and endpoint security. The findings show a dramatic increase in so-called “evasive malware,” contributing to a significant increase in the overall malware volume. Increased attacks on email servers are also noticeable. Furthermore, the results indicate a decreasing number…

Read more

Cyber ​​threats: another record high in 2023
Cyber ​​threats: another record high in 2023

The number of cyber threats reached a record high in 2023. This is what Trend Micro’s Annual Cybersecurity Report shows. Trend Micro security systems detected and blocked malicious activity more than 161 billion times. The development of the past few years continues: since 2019, the number of threats has almost tripled to around 54 billion. The study also shows that cybercriminals are attacking more specifically, evolving their ransomware tactics and becoming more sophisticated. Companies should also urgently keep an eye on their cloud environments. Because the two most common cyber risks that Trend Micros Attack Surface Risk Management…

Read more

Many companies are vulnerable to QR code phishing
B2B Cyber ​​Security ShortNews

With QR code phishing attacks on the rise, new data from a recent report sheds light on how unprepared organizations really are to mitigate and detect these cross-device attacks. 3 out of 4 companies have already been attacked in this way. One of the challenges of defending against cyberattacks is that you often rely on security solutions that look for indicators of suspicious activity. The content of an email, the location to which a link points, and the content of an attachment can indicate possible malicious intent. Scanners often do not detect malicious QR codes…

Read more

Targeted email attacks on energy and utilities sectors
Targeted email attacks on energy and utilities sector - Image by Sergio Cerrato - Italia on Pixabay

Successful attacks on energy and utility companies such as Colonial Pipeline or Ukrainian Energy Utilities show how far-reaching an attack can be. In many cases, the first steps of the attack take place via sophisticated email attacks. Energy and utility companies are increasingly using digital technologies to manage and integrate complex distributed operations and remote locations such as wind farms, power plants and grids. Successful attacks on energy and utility companies show how far-reaching their impact can be. One example is the May 2021 ransomware attack on Colonial Pipeline, the largest fuel pipeline in the United States. This resulted in a ransom payment of...

Read more

Threat situation requires cybersecurity outsourcing

Cybersecurity – times are getting tougher: More than half of the companies surveyed (53 percent) expect a significant increase in cyber threats in the future. 43 percent, on the other hand, believe that the current level of cyber attacks will remain constant. This was the result of an interesting survey as part of a Cybersecurity as a Service study by Sophos. A so-called security operations center (SOC) is a crucial element of a modern, proactive security strategy. It focuses on the detection, analysis and response of security incidents in order to minimize the corresponding risks and to optimally protect data and business-critical processes in companies...

Read more