News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

APT28 – Fancy Bear: Attack campaigns in 14 countries
B2B Cyber ​​Security ShortNews

The Unit 42 team at Palo Alto Networks has released a new research report that provides new evidence and insights into ongoing activities of the Russian-backed threat actor “Fighting Ursa,” better known as “APT28” or “Fancy Bear.” Earlier this year, Ukrainian cybersecurity researchers discovered that Fighting Ursa exploited a zero-day exploit in Microsoft Outlook (now known as CVE-2023-23397). This vulnerability is particularly concerning because it does not require user interaction to exploit. Unit 42 researchers have observed this group using CVE-20-2023 to attack at least 23397 organizations in 30...

Read more

Armed with threat intelligence against cybercriminal activities

Against the background of the current geopolitical situation, an increasing number of cyber threats can be expected. Threat actors around the world have always taken advantage of uncertain times to launch campaigns against companies of all sizes and industries, adapting their methods and tactics accordingly. Companies should therefore use threat intelligence to gain a better overview. An analysis by Christian Milde, Managing Director Central Europe at Kaspersky. Accordingly, tracking, analyzing, interpreting and containing constantly evolving IT security threats is a mammoth task. However, threat intelligence provides deep insight into the threat landscape and allows organizations to…

Read more

Webinar April 21, 2022: Resilience against cyber espionage campaigns
B2B Cyber ​​Security ShortNews

Trellix invites you to the free webinar on April 21, 2022 from 14:00 p.m. “Operation Graphite – Strengthening resilience against cyber espionage campaigns”. This is how threat actors exploit trusted avenues within the organization to slowly and stealthily defeat standard security controls. Organizations are beefing up their security measures and implementing more robust authentication and network security controls, leaving attackers looking for another route to success. One such new avenue is "Operation Graphite," uncovered by the Trellix Advanced Threat Research team. In this webinar, we'll explore how threat actors are exploiting trusted enterprise avenues to slowly and stealthily defeat standard security controls,...

Read more