Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware: Cybercrime groups increase ransom demands

As a new report shows, cybercriminals continue to rely on business email compromise in addition to ransomware and use long-known, unpatched vulnerabilities for attacks. The report shows that ransom demands are becoming increasingly outrageous. The Arctic Wolf Labs Threat Report was created based on threat, malware, digital forensics and incident response case data that Arctic Wolf collects across the security operations framework. It provides deep insights into the global cybercrime ecosystem, highlights global threat trends, and provides strategic cybersecurity recommendations for the coming year. Ransomware claims increase by 20% Cybercrime has increased in recent…

Read more

Cyberattacks: Complications in Patient Care
Cyberattacks lead to complications in patient care

Cyberattacks impacted patient care in two-thirds of healthcare facilities last year. The study surveyed 653 healthcare IT and security experts. It states that the costs per cyber attack have increased by 13 percent compared to the previous year. The USA has been a pioneer of relevant technical innovations for many years and is therefore an indicator for future developments in Germany. Unfortunately, this also applies to the area of ​​cybercrime. In particular, cyber criminals are now also affecting the healthcare system on a large scale. This is the result of a current study by the Ponemom Institute on behalf of…

Read more

Hackers hide behind Google Collection
Checkpoint News

New phishing campaign from the business email compromise sector discovered: Hackers camouflage their activities behind the Google Collection tool. Check Point Research (CPR), the threat intelligence division of Check Point® Software Technologies Ltd. has discovered that hackers are abusing the Google Collection. On the one hand, you benefit from the tool's ability to save and share links, images and videos with others, and on the other hand from the Google brand, which makes your phishing emails appear legitimate. The security researchers describe how hackers abuse Google's sites to send links to fake cryptocurrency sites. This is how the Google Collection looks...

Read more