News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Anatomy of a modern cyber attack
Anatomy of a modern cyber attack

Cyber ​​attacks are seldom carried out by technically skilled attackers. Traditional hacking methods such as decoding encryption or infiltrating firewalls are becoming a thing of the past. The anatomy of a cyberattack is changing. Criminals no longer hack into; they just log in. Because weak, stolen or otherwise compromised login data create an easy gateway for malicious actors, even if they have only limited technical skills. Employee logins stolen The recent data breach on Twitter, in which dozens of prominent user accounts were hijacked, is a good example of how cyberattacks are now ...

Read more

Cloud: 90 percent of cyber attacks with login data
B2B Cyber ​​Security ShortNews

Centrify study: 90 percent of hackers use compromised privileged credentials in cyber attacks on the cloud. Cybercriminals are increasingly targeting the cloud in times of remote work. An overwhelming proportion (90 percent) of cyber attacks on cloud environments in the past twelve months involved compromised privileged credentials. This is the result of a new study by Centrify, a leading provider of modern Privileged Access Management (PAM) solutions. 65 percent of the IT decision-makers surveyed had attempted attacks on their cloud environments, and 80 percent of these attacks were also successful. 150 IT decision-makers in the USA surveyed To assess how the dependency on the cloud ...

Read more

Phishing remains hacker's favorite
Phishing remains hacker's favorite

Phishing remains hacker's favorite: finally putting a stop to one of the oldest hacking tricks. Phishing is one of the oldest tricks in the cybercriminal arsenal. With this tactic, employees can become ignorant accomplices in a major cyber attack with just one click. Since the pandemic puts additional strain on employees, attackers are misusing the situation to capitalize on the crisis with a flood of corona-related phishing campaigns. Especially when cybercriminals gain access to legitimate login credentials through phishing attacks, the consequences for businesses can be devastating. Forrester estimates that 80 percent of security breaches are related to compromised privileged credentials….

Read more