News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Caught: Black Basta structure X-rayed
Caught: Black Basta structure X-rayed

The security provider Quadrant managed to follow a Black Basta attack live and to evaluate the technical background. The experts do not know the processes at Black Basta, but have also uncovered the loopholes, which can now be monitored. This is a heavy blow for the entire structure of Black Basta, which can no longer be used in this way. Quadrant recently assisted a customer in an enterprise-wide compromise by the Black Basta ransomware group. This group is a ransomware-as-a-service (RaaS) organization known to target mid-sized and large enterprises...

Read more

Key technologies against ransomware
Key technologies against ransomware

Ransomware is a chronic threat. But their appearance is constantly changing. On the one hand, behind the permanent change there is a scene that is becoming more and more professional, thinks more economically or even politicizes itself in the current crisis. On the other hand, there are new technologies. Here Bitdefender shows four pillars for defending against extortion attacks. An effective defense must set up itself accordingly in depth and ward off the extortionate attacks in the various phases. The current Bitdefender Threat Report, which takes into account the telemetry data from the previous month, shows for the month of May 2022 how active…

Read more

Webinar June 03, 2022: Using Kaspersky Threat Intelligence
Kaspersky_news

Kaspersky's threat experts invite you to a free webinar on June 03, 2022. Topic: Using Kaspersky Threat Intelligence. The background is that access to the Threat Intelligence Resource Hub is currently free of charge. Kaspersky threat hunters analyze hundreds of thousands of new viruses every day. In the Kaspersky LIVE webinar "Threat Intelligence" on June 3, 2022 at 10 a.m., the experts will share their knowledge from the analysis of current, targeted attacks (APT) directly with the participants. Sign up and get the inside scoop on the latest and most sophisticated cyberattacks. With this information…

Read more

The advantages of cloud-based IT forensics
The advantages of cloud-based IT forensics

On a local computer, digital forensics are subject to strict limits; the use of cloud-based applications in the data center or with a cloud provider makes the work of the experts much easier. Exterro names the advantages of centrally running forensic solutions for companies and authorities. After cyber attacks, data protection violations or criminal offenses in which smartphones, online services and other digital tools were used, IT forensic scientists in companies and investigative authorities often have to examine enormous amounts of data and are often under time pressure. They are therefore dependent on modern tools that quickly save and evaluate data from a wide variety of sources, prepare test results clearly...

Read more

Lapsus$ Group - Findings on Spectacular Attack Streak
B2B Cyber ​​Security ShortNews

The cybercriminals Lapsus$ group has made headlines in recent months. Palo Alto Networks provides information on the spectacular series of attacks and its current ransomware report. Palo Alto Networks already published the current 2022 Unit 42 Ransomware Threat Report. According to this, the average ransom demands in 2021 increased by 144 percent to 2,2 million US dollars. The average payment increased 78 percent to $541.010 over the same period. The Lapsus$ Group threat actor has gone from a handful of destructive attacks to stealing and releasing source code from several leading technology companies in just a few months. lapse$…

Read more

Study: Every 10th security incident is serious

A Kaspersky MDR study shows that one in ten corporate security incidents is serious. A third of the incidents classified as serious are due to targeted attacks or APTs. The public sector is most affected. One in ten (9 percent) prevented cybersecurity incidents in companies would have caused massive disruptions or unauthorized access to the IT systems of the companies concerned, as a current Kaspersky analysis shows. Kaspersky IT security specialists rate the majority of incidents (72 percent) as moderate. Cyber ​​defense is growing in companies If these had not been discovered and stopped, they would have ...

Read more

BSI starts personal certification for incident experts
B2B Cyber ​​Security ShortNews

Attacks on IT systems in Germany cause tens of billions of euros in damage every year. Those affected are small to large companies, but also consumer households. Certified incident experts provide first aid in the event of a cyber attack. Cyber ​​criminals break into IT systems, read out data, encrypt it and extort a ransom for releasing the data. In such an emergency situation, it can be difficult, especially for micro and small businesses, but also for medium-sized companies, to evaluate the competence and trustworthiness of IT service providers. Incident expert certified by the BSI. Arne Schönbohm, President of the BSI: "With the cyber security network, we want a ...

Read more

Cyber ​​gangsters on average 11 days undetected in networks
Cyber ​​gangsters on average 11 days undetected in networks

New Sophos Incident Response Almanac: Cyber ​​gangsters stay undetected in networks for an average of 11 days. Sophos publishes new "Active Adversary Playbook 2021" with telemetry data from its MTR and Rapid Response team: Hackers used more than 400 different tools and techniques, 81 percent of the incidents involved ransomware and 69 percent of the attacks involved remote Desktop Protocol (RDP) used for crawling. Sophos has published its “Active Adversary Playbook 2021”. It describes the attackers' behavior, tools, techniques, and procedures (TTPs) as Sophos threat hunters and analysts monitor them from 2020 through spring 2021 ...

Read more

Exchange hackers surrender to Office 365
Exchange hackers surrender to Office 365

Attackers use SSRF vulnerability for extremely large-scale Exchange server takeovers. However: Exchange hackers capitulate to Office 365. A comment from Dr. Klaus Gheri, General Manager Network Security at Barracuda Networks. An outcry has raged through the Exchange email server community since last week after Microsoft announced that a cybercrime group known as Hafnium was launching its attack campaign to target vulnerabilities around Microsoft Exchange's Outlook Web Access interface exploits. And there are many weak points. The headlines that have been produced since then are correspondingly drastic. In general, companies across Germany are affected, in particular several federal authorities, including the Federal Environment Agency, which ...

Read more

AI analysis in cloud video surveillance 
B2B Cyber ​​Security ShortNews

People take in most of the information visually. This is difficult for machines. Why? Video data is very large. Therefore, there are massive challenges when trying to analyze video using today's artificial intelligence (AI) tools. It starts with the challenge of aggregating the large amounts of data in one place and making it available to the AI ​​in a structured manner. In addition, aspects of security and data protection must be taken into account. What would not be possible if the streams of a large number of cameras at places as far away as you want with artificial ...

Read more