News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Unlawful official requests for information at mailbox.org
B2B Cyber ​​Security ShortNews

The email service mailbox.org from Berlin, which specializes in data protection and data security, has published its annual transparency report on official requests for information for 2023 and is taking stock. The total number of government information requests to mailbox.org rose sharply last year, to a total of 133 compared to 55 the previous year. And the number of requests rejected by mailbox.org due to illegality also rose sharply, from 14 in 2022 to 45 in 2023. This means that around a third (33,8 percent) of all government requests made to mailbox.org were rejected because they contained errors or…

Read more

Analysis: This is how an attack by the Akira ransomware group works

South Westphalia's IT was attacked by the hacker group "Akira", which has meant that numerous local governments have only been able to work to a limited extent for weeks. The ransomware group encrypted server data and is now demanding a significant ransom, which is not paid. Akira, a new type of ransomware, only appeared in the spring. But who is actually behind the group? Trend Micro analyzes the background, techniques and tactics of this highly targeted successful group. “Our analysis shows that the ransomware uses similar routines to Conti, such as obfuscating strings and encrypting files. It also avoids the same file extensions as...

Read more

When hackers exploit unsecured video conferences 
When hackers exploit unsecured video conferences - Image by Alexandra_Koch on Pixabay

German companies and municipalities risk enormous damage from cyber attacks in the near future. Highly secure video conferences, certified by the BSI, are one aspect that can ward off hacker attacks. Many video platforms have security gaps and make companies vulnerable. The economy currently lacks more than 100.000 specialists for cybersecurity - a need that cannot be met in the foreseeable future. The good news is that companies cannot only increase the security of their IT infrastructure by hiring cybersecurity experts. When securing your own video conferences, for example, it already helps to switch to highly secure software to make life difficult for criminals.

Read more

Report: High vulnerability rates in government applications
Report: High vulnerability rates in government applications

The 13th edition of the State of Software Security Report, publishes the trends in the software landscape and how security practices are evolving. Some of the results are worrying: 82 percent of applications developed in the public sector had at least one security vulnerability discovered, compared to 74 percent in private companies. The State of Software Security study shows that applications for the public sector tend to have more security vulnerabilities than applications for the private sector. The higher number of errors and vulnerabilities in applications correlates with an increased security risk. The study was carried out against the background...

Read more

Younger employees disregard safety rules
B2B Cyber ​​Security ShortNews

According to the German Association of Civil Servants, around a quarter of all public sector employees will resign in the next ten years for reasons of age. They are being replaced by young employees from Millennials and Generation "Z". An example of this: a good third of Generation Z employees also use private passwords at work (35%). Among millennials, this behavior is still found in one in four respondents (26%). In contrast, just 8% of employees born before 1965 (baby boomers) use the same passwords for private and business use....

Read more

Digital excellence in government
Digital excellence in government

Digital, progressive, flexible, close to the citizen: The administration in the federal, state and local authorities should become "more digital", is often overwhelmed and only moves at a snail's pace. The IT landscape in particular is jagged: many systems are old and often not cloud-capable. The task now is to standardize the digital infrastructure with the right solution and make it fit for future expansions. From a technical point of view, public administrations are often at least as complex as large companies. Tens of thousands of rooms, several thousand server racks and several million software installations quickly come together. In addition, the support is often organized in a decentralized way...

Read more

EAL 4+ certification for VPN technology NetMotion Mobility
B2B Cyber ​​Security ShortNews

Absolute Software, a leading provider of self-healing zero trust solutions, has achieved Common Criteria Evaluation Assurance Level (EAL) 12.14+ with its NetMotion Mobility 4 VPN solution. NetMotion Mobility, which meets the highest level of certification internationally recognized under the Common Criteria program for software products, is the company's Secure Access product. Absolute is the only networking solution provider to receive this certification for its Virtual Private Network (VPN) technology for Android, iOS, macOS and Windows. The certification confirms that NetMotion Mobility meets the highest security requirements and meets the complex security requirements of government and enterprise customers....

Read more

Safe surfing with TightGate-Pro

m-privacy develops remote-controlled web browsers for maximum internet security in industry, healthcare and government. ProSoft presents safe surfing with TightGate-Pro, whereby the screen display of the browser is delivered as a video data stream. The use of the internet is an integral part of working life. However, safe surfing is now only possible to a limited extent, as cyber criminals specifically use the web browser to smuggle dangerous malware onto workstation computers. Under the slogan "Distance creates security", ProSoft is now presenting TightGate-Pro from m-privacy GmbH for secure surfing, which offers a new form of Internet security: With TightGate-Pro, the browser is set to highly hardened ...

Read more

Video conference solution with automatic end-to-end encryption

Digital sovereignty and maximum data protection with OpenTalk. Heinlein Support shows a new, secure video conference solution with automatic moderation of large numbers of participants or support for user groups. Heinlein Support GmbH, Linux and IT specialist from Berlin, bring the innovative video conference solution OpenTalk. The new product offers secure video conferencing for all users who value scalability, digital sovereignty and data protection. Easily scalable for authorities or schools Thanks to numerous innovative functions such as automatic moderation of large numbers of participants, support for user groups or private discussions during ongoing conferences, OpenTalk is particularly suitable for political debates or use in schools ...

Read more

APT group attacks Mongolian authorities
Eset_News

ESET announces: Operation StealthyTrident: espionage attack on Mongolian government agencies. Installation programs and the update system of frequently used software were provided with malicious code. Around 430 authorities in the Mongolian government have fallen victim to an APT group. ESET researchers found that the hackers compromised a chat software called Able Desktop, which is used in a business management suite popular in Mongolia. In a first step, the cyber criminals manipulated the installation program and later also the update system and used it to spread malware. The attacker's goal was to target sensitive ...

Read more