News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Phishing 2025: AI, Phishing-as-a-Service, Vishing
Phishing: Trends 2025

A leading cybersecurity company has analyzed last year's phishing attacks and identified eight trends for 2025. Attackers are increasingly using advanced phishing attack methods to bypass security measures and make malicious emails more convincing, plausible, and personalized. Barracuda Networks' threat analysts observed several advanced phishing methods in 2024. Looking ahead to 2025, the threat analyst team expects the following trends, among others: Phishing-as-a-Service (PhaaS) and credential theft Data collected by Barracuda shows that in 2024, more than 85 percent of phishing attacks against customers aimed to steal credentials....

Read more

Email security: More effective protection through AI
Email security: More effective protection through AI

A security solutions provider has further developed its email security platform. The AI-powered solution complements Microsoft 365 and improves data protection. It detects and blocks 99 percent of phishing attacks. The continuous investment by Barracuda Networks Inc., a leading provider of cloud-first security solutions, in machine learning technology has improved the detection rate of its Barracuda Email Protection email security platform. Innovations also lead to improvements in the areas of usability, reporting, data loss protection and data residency support for international customers. Microsoft 365 does not detect complex email attacks According to data collected by Barracuda between January 2024 and April 2024 on...

Read more

Data manipulation, the underestimated danger
Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of having a current and easily accessible copy of all important company data to protect against data manipulation. Reliable backups enable faster recovery from damage, interruption or data loss; and especially if files have been encrypted or deleted by a ransomware attack. However, these well-known backup scenarios remain rare. Immutable backups can also protect against the more underestimated threats of data manipulation or malicious insiders. Unforeseeable activities that can significantly damage the trust and reputation of a brand if not...

Read more

New wave of phishing: Attackers use Adobe InDesign
New wave of phishing: Attackers use Adobe InDesign

Currently, there is an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. According to Barracuda telemetry, the number of emails containing Adobe InDesign links has increased by almost 30 times since October. Previously, the daily number was around 75 emails per day, but now it has increased to around 2.000. Almost one in 10 (9 percent) of these emails contain active phishing links. Many of these links have the top-level domain ".ru" and are hosted behind a content delivery network (CDN) that acts as a proxy for the source site. This…

Read more

Cyber ​​attacks cost over 5 million euros annually
Cyber ​​attacks cost over 5 million euros annually

Cyber ​​attacks are increasing. Last year, 71 percent of German companies fell victim to ransomware. 59 percent paid ransoms. 53 percent fear more hacker attacks through generative AI technologies. Barracuda Networks has released its Cybernomics 101 Report, which analyzes the financial impact and profit motives behind cyberattacks. The research found that for German companies, the average annual cost of responding to attacks is around 5,7 million euros ($6,2 million). Ransomware attacks on over 70% of German companies The report also raises alarm as hackers explore how to use generative AI technology (GenAI)...

Read more

Detect and defend against threats
Detect and defend against threats

In today's digitalized business landscape, combating threats requires a continuous, proactive and holistic approach. Open Extended Detection and Response (Open XDR) is a security technology that meets these criteria because XDR goes beyond just threat detection to coordinate defensive responses across a range of security tools. In the case of Open XDR, this happens regardless of the type, origin or provider of the tools. Below we'll explore XDR's end-to-end threat response capabilities to demonstrate what XDR can do for an organization's security posture...

Read more

Healthcare is a prime target for email attacks
Healthcare is a prime target for email attacks

In one survey, the healthcare industry experienced more email security breaches than average. The recovery costs following such attacks are particularly problematic for the healthcare system. Ransomware attacks on healthcare organizations have more than doubled since 2022, according to the latest Barracuda Ransomware Annual Report. However, when you look at healthcare in comparison to other industries, a more complex picture emerges, says Dr. Klaus Gheri, Vice President & General Manager Network Security at Barracuda Networks. In many cases, this sector experiences fewer major cyber incidents than other industries…

Read more

QR Codes and Phishing: Quishing Attacks
B2B Cyber ​​Security ShortNews

How cybercriminals abuse QR codes for phishing. The use of technology is constantly evolving to make personal and professional lives more convenient, as evidenced by the quick response code. For example, this two-dimensional barcode allows users to quickly and easily share website URLs and contact information or make payments. However, this technology has also opened up new opportunities for cybercriminals. QR code phishing attacks, also known as quishing, are on the rise and pose a significant threat to users and businesses alike. QR codes for email attacks Hackers are using QR codes in email attacks, to trick recipients into visiting malicious websites…

Read more

Intruders in your email inbox
Email as a primary attack vector

Automated email inbox rules are a useful and familiar feature of most email programs. They help manage your inbox and the daily flood of wanted and unwanted messages by allowing you to move emails to specific folders, forward them to colleagues when you're away, or delete them automatically. However, once an account has been compromised, attackers can abuse inbox rules to disguise further attacks, for example by secretly exfiltrating information from the network via forwarding, ensuring that the victim does not see security warnings, and deleting certain messages. E-mail…

Read more

Ransomware: Even more successful through AI
Ransomware: Even more successful through AI

Criminals are now using AI to make their ransomware attacks even more efficient. If you look at the latest developments, there is no all-clear in sight. Thanks to AI, phishing emails are getting better and more dangerous. Ransomware has long been a real problem for organizations of all types and sizes. In a recent study, security researchers at Barracuda were able to prove that not only the quantity of ransomware attacks but also the quality has increased. AI creates grammatically correct phishing emails Nominally, the number of reported attacks across all industries has increased in the last…

Read more