News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

New wave of phishing: Attackers use Adobe InDesign
New wave of phishing: Attackers use Adobe InDesign

There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. According to Barracuda Telemetry, the number of emails containing Adobe InDesign links has increased nearly 30x since October. While the daily number was previously around 75 per email per day, it has now increased to around 2.000. Almost one in 10 (9 percent) of these emails contain active phishing links. Many of these links have the top-level domain “.ru” and are hosted behind a Content Delivery Network (CDN) that acts as a proxy for the source site. This…

Read more

Cyber ​​attacks cost over 5 million euros annually
Cyber ​​attacks cost over 5 million euros annually

Cyber ​​attacks are increasing. Last year, 71 percent of German companies fell victim to ransomware. 59 percent paid ransoms. 53 percent fear more hacker attacks through generative AI technologies. Barracuda Networks has released its Cybernomics 101 Report, which analyzes the financial impact and profit motives behind cyberattacks. The research found that for German companies, the average annual cost of responding to attacks is around 5,7 million euros ($6,2 million). Ransomware attacks on over 70% of German companies The report also raises alarm as hackers explore how to use generative AI technology (GenAI)...

Read more

Detect and defend against threats
Detect and defend against threats

In today's digitalized business landscape, combating threats requires a continuous, proactive and holistic approach. Open Extended Detection and Response (Open XDR) is a security technology that meets these criteria because XDR goes beyond just threat detection to coordinate defensive responses across a range of security tools. In the case of Open XDR, this happens regardless of the type, origin or provider of the tools. Below we'll explore XDR's end-to-end threat response capabilities to demonstrate what XDR can do for an organization's security posture...

Read more

Healthcare is a prime target for email attacks
Healthcare is a prime target for email attacks

In one survey, the healthcare industry experienced more email security breaches than average. The recovery costs following such attacks are particularly problematic for the healthcare system. Ransomware attacks on healthcare organizations have more than doubled since 2022, according to the latest Barracuda Ransomware Annual Report. However, when you look at healthcare in comparison to other industries, a more complex picture emerges, says Dr. Klaus Gheri, Vice President & General Manager Network Security at Barracuda Networks. In many cases, this sector experiences fewer major cyber incidents than other industries…

Read more

QR Codes and Phishing: Quishing Attacks
B2B Cyber ​​Security ShortNews

How cybercriminals abuse QR codes for phishing. The use of technology is constantly evolving to make personal and professional lives more convenient, as evidenced by the quick response code. For example, this two-dimensional barcode allows users to quickly and easily share website URLs and contact information or make payments. However, this technology has also opened up new opportunities for cybercriminals. QR code phishing attacks, also known as quishing, are on the rise and pose a significant threat to users and businesses alike. QR codes for email attacks Hackers are using QR codes in email attacks, to trick recipients into visiting malicious websites…

Read more

Intruders in your email inbox
Email as a primary attack vector

Automated email inbox rules are a useful and familiar feature of most email programs. They help manage your inbox and the daily flood of wanted and unwanted messages by allowing you to move emails to specific folders, forward them to colleagues when you're away, or delete them automatically. However, once an account has been compromised, attackers can abuse inbox rules to disguise further attacks, for example by secretly exfiltrating information from the network via forwarding, ensuring that the victim does not see security warnings, and deleting certain messages. E-mail…

Read more

Ransomware: Even more successful through AI
Ransomware: Even more successful through AI

Criminals are now using AI to make their ransomware attacks even more efficient. If you look at the latest developments, there is no all-clear in sight. Thanks to AI, phishing emails are getting better and more dangerous. Ransomware has long been a real problem for organizations of all types and sizes. In a recent study, security researchers at Barracuda were able to prove that not only the quantity of ransomware attacks but also the quality has increased. AI creates grammatically correct phishing emails Nominally, the number of reported attacks across all industries has increased in the last…

Read more

Email blackmail on the rise

In extortion emails, cybercriminals threaten to publish compromising information about their victims, such as an embarrassing photo, and demand payment in cryptocurrency. Attackers often purchase victims' login credentials or obtain them through data breaches to "prove" that their threat is legitimate. To gain a better understanding of the financial infrastructure attackers use in extortion emails, Barracuda partnered with researchers at Columbia University to analyze over 300.000 emails captured by Barracuda Networks' AI-based detectors over a period of one year year when extortion attacks were detected. Below are the…

Read more

Renewable energy systems inadequately secured
Renewable energy systems inadequately secured

In April 2022, a few months after the Russian attack on Ukraine began, three wind energy companies in Germany were hit by cybercriminals. The attacks paralyzed thousands of digitally controlled wind turbines. It is estimated that by 2050, the world's power systems will depend on 70 percent renewable energy, primarily from solar, wind, tidal, rain and geothermal sources. These energy sources are typically decentralized, geographically remote, and relatively small. They are often managed and operated using insufficiently secured digital technologies that are directly linked to the aging infrastructure of national electricity grids…

Read more

Cyber ​​attacks: Cities and municipalities increasingly targeted
Barracuda News

Attacks on municipalities, healthcare and education have doubled since August 2022. This is what the Barracuda ransomware report reports. Barracuda has released the results of its fifth annual ransomware report. As the basis for the report, the cloud security specialist identified and analyzed 175 publicly reported attacks from the last 12 months. A worrying finding of the report is that successful ransomware attacks in the three social sectors of municipalities, education and healthcare have more than quadrupled since 2021. Attacks on finance are declining. Attacks on cities and municipalities increased between August 2022 and July...

Read more