News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

A new era of cyber threats
B2B Cyber ​​Security ShortNews

In recent years, there has been a paradigm shift in the area of ​​IT security, driven primarily by the rapid development and introduction of artificial intelligence (AI). This technological advancement brings many benefits, but has also ushered in a new era of cyber threats that are more complex, more deceptive and difficult to combat. One of the most pressing issues in this new threat landscape is the increasing sophistication of ransomware attacks as AI technologies become more accessible and advanced, which hackers can exploit to their advantage. They make generative AI, i.e. tools like ChatGPT, their…

Read more

Threatened blockchain security
Threatened blockchain security

The exponential rise of blockchain technology and cryptocurrencies has redefined finance and digital transactions. But with great potential comes great risks. According to a report by CNBC, over 2021 billion euros worth of cryptocurrencies were stolen by hackers in 13. This alarming statistic highlights the urgent need to increase the security of blockchain ecosystems. In order to prevent further disasters of this kind, it is therefore worth drawing lessons from the existing cases for future crypto security strategies. Terra Luna and Wormhole One of the significant events that shaped the cryptocurrency…

Read more

Mobile devices: High risk from AI-generated attacks
Mobile devices: High risk from AI-generated attacks

On mobile devices, the risk of a cyber attack through infected apps, fake AI websites, fake proxy servers and phishing is high. Generative artificial intelligence (AI) tools such as ChatGPT and Google Bard are becoming increasingly popular around the world. They enable their users to increase efficiency and productivity in their daily work. However, these diverse application possibilities are both a blessing and a curse, as they can also be misused by hackers for cyber attacks. Shortly after their introduction, generative AI tools were quickly used to create malware. Many of them appeared in the official app stores. Aside from that…

Read more

Artificial intelligence in IT
B2B Cyber ​​Security ShortNews

The year 2023 could go down in history as the year of artificial intelligence (AI) – or at least the year that businesses and consumers alike raved about generative AI tools like ChatGPT. IT security solution providers are not immune to this enthusiasm. At the RSA Conference 2023, one of the leading international conferences in the field of IT security, the topic of AI was addressed in almost every presentation - for good reason. AI has enormous potential to transform the industry. Our security researchers have already identified the use of AI by hackers...

Read more

SASE solutions to combat staff shortages in IT
SASE solutions to combat staff shortages in IT

The German IT sector suffers from a shortage of personnel and is chronically understaffed. According to Bitkom, there was a shortage of around 137.000 IT specialists in Germany last year - the highest level of a deficit that has persisted for years. On average, an open position remained vacant for over seven months with employers and, due to demographic change, more IT staff are leaving the labor market for retirement than newly trained experts are joining. At a global level, things aren't looking rosy either: According to cybersecurityventures.com, the number of unfilled IT security positions will rise to 2023 million in 3,5. The consequences:…

Read more

Phishing via Microsoft Sharepoint
Checkpoint News

Hackers use not only Google but also Microsoft Sharepoint for advanced phishing campaigns. Check Point Research (CPR), the threat intelligence division of Check Point® Software Technologies Ltd. presents the third case of misusing a legitimate tool to disguise phishing campaigns. In addition to Google Collection and Google Ad, Microsoft SharePoint is now being added. The program is mainly used to send phishing e-mails to give them a deceptively real look. How hackers use Microsoft Sharepoint The security researchers describe how hackers misuse the program to send phishing e-mails. An example: The link leads…

Read more

Hackers hide behind Google Collection
Checkpoint News

New phishing campaign from the business email compromise sector discovered: Hackers camouflage their activities behind the Google Collection tool. Check Point Research (CPR), the threat intelligence division of Check Point® Software Technologies Ltd. has discovered that hackers are abusing the Google Collection. On the one hand, you benefit from the tool's ability to save and share links, images and videos with others, and on the other hand from the Google brand, which makes your phishing emails appear legitimate. The security researchers describe how hackers abuse Google's sites to send links to fake cryptocurrency sites. This is how the Google Collection looks...

Read more

Deceptive links in Google ads
Checkpoint News

Hackers build fraudulent links into Google ads to lure users to dangerous websites. Check Point Research (CPR), the threat intelligence division of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global leader in cyber security solutions, discovered another hacking campaign affecting Google. Hackers infect Google Ads with scam links. Users don't even have to click on the ads themselves, but instead receive a phishing e-mail that Google Ads uses in the background. Google is particularly interesting because the company is the largest provider of advertising on the Internet ....

Read more

Phishing: Microsoft and Google most commonly impersonated
Phishing: Microsoft and Google most commonly impersonated

The Brand Phishing Report shows which brands are most commonly impersonated to steal personal or payment information. Microsoft, Google and Apple are currently the top three most imitated brands. In Q2023 2023, global technology company Microsoft climbed the Brand Phishing Report rankings, moving up from third place in Q29 XNUMX to first place. The tech giant accounted for XNUMX percent of all phishing attempts. This could be partly due to a phishing campaign, where hackers sent deceptive messages to account holders about…

Read more

Zero trust, especially with patient data
Zero trust when it comes to patient data

Wherever data needs to be protected, the Zero Trust principle is an indispensable security approach - especially in the healthcare sector. Cyber ​​attacks are increasing rapidly there. As healthcare organizations continue to go digital, one thing has become clear: the well-being of patients cannot come first if the digital systems that support them are compromised. According to the Journal of the American Medical Association (JAMA), the frequency of cyberattacks on hospitals and healthcare systems will more than double between 2016 and 2021. Research by Check Point Software Technologies confirms this trend and shows that…

Read more