News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​threat: Rhysida ransomware
B2B Cyber ​​Security ShortNews

Rhysida ransomware's tactics and techniques are similar to those of the infamous Vice Society ransomware gang. Experts suspect that Vice Society is using its own variant of ransomware. Security researchers from the Threat Intelligence Department of Check Point® Software Technologies Ltd. (NASDAQ: CHKP) link the malware to a notorious ransomware gang. The procedures are the same in many ways, as Check Point's Incident Response Team reported. This doesn't mean that Vice Society is using the new ransomware exclusively, but probably mainly. Attacks on Healthcare and Education Vice Society is one of the most aggressive ransomware gangs so far since 2021…

Read more

Report: Global increase in cyber attacks
Checkpoint News

Largest increase in cyber attacks in the last two years. Lockbit3 was the top ransomware in the first half of 2023. On average, attacks per week have increased by 8 percent. Recently, Check Point Research (CPR) released its 2023 Mid-Year Security Report. The report reveals a disturbing eight percent increase in weekly cyber attacks worldwide in the second quarter of 2023 - the largest increase in the past two years. Attackers mix old and new forms of cyber crime The security researchers look at how attackers...

Read more

New danger: hacking of electric vehicles
B2B Cyber ​​Security ShortNews

More and more people are choosing electric cars, be it for reasons of innovation or for environmental reasons. But the ecological and technological advantages of electric vehicles come with new risks. According to the Global Automotive Cybersecurity Report, threats against application programming interfaces (APIs) increased by up to 2022 percent by 380, accounting for 12 percent of all incidents. This also applies to the system design of electric cars. The safety of the drivers and the data that the vehicles generate are at stake. Like the perpetrators, the industry must act quickly...

Read more

Cloud Security Report 2023: Misconfiguration Threat
Cloud Security Report 2023: Misconfiguration Threat

Despite the numerous benefits companies are reaping from the cloud, such as: Securing the cloud effectively continues to be a challenge, for example due to scalability and flexibility. The survey shows that misconfigurations are the main problem with cloud security with 59 percent of the respondents. Not only do these misconfigurations leave organizations vulnerable, they also prevent them from realizing the full potential of the cloud. 48% Increase in Cloud-Based Network Attacks Unsurprisingly, organizations are rapidly expanding their cloud footprint: 58% plan to increase their cloud footprint within the next 12 to 18 months by more than...

Read more

Good AI, bad AI
B2B Cyber ​​Security ShortNews

According to security researchers in Israel, hacker gangs are already using artificial intelligence (AI) to train their new members. They are also assisted by AI to improve malware, automate attacks and generally run their criminal operations smoothly. On the other hand, the management consultants at McKinsey found out through a survey for the year 2022 that 50 percent of the companies surveyed use AI to support work in at least one business area - in 2017 it was only 20 percent. According to Forbes Magazine, 60 percent of the entrepreneurs surveyed believe…

Read more

Google Bard as malware author
Google Bard as malware author

Security researchers were able to use Google's generative AI Bard to generate phishing emails, malware keyloggers and simple ransomware code. The Generative AI revolution has sparked a paradigm shift in the field of artificial intelligence, enabling machines to create and generate content with remarkable sophistication. Generative AI refers to the subset of AI models and algorithms capable of autonomously generating text, images, music, and even videos that mimic human creations. This breakthrough technology has opened up a multitude of creative possibilities, from supporting artists and designers to…

Read more

Dangerous Telegram clone
B2B Cyber ​​Security ShortNews

Modified versions of mobile applications are very common in the world of apps. These applications may offer additional features and customizations, reduced prices, or be available in a larger number of countries than the original application. Their offer can be so tempting that careless users install them via unofficial external application stores. The risk of installing modified versions is that the user cannot know what changes have actually been made to the application code. More specifically, it is not known what code was added and whether it has malicious intent. The check point…

Read more

All about the CISO
All about the CISO

What does a CISO need to have? In today's threat landscape, Chief Information Security Officers have a significant responsibility. Taking on the role of a CISO just like that is not a good idea. They have a major influence on the company and must regularly demonstrate their worth and competence. Just stumbling into the CISO role isn't the best option, because if you want to advance a career in cybersecurity, you should prepare well. This guide provides information to help you clearly define your path to becoming the in-demand CISO that…

Read more

Qbot remains top malware
Qbot remains top malware

The Qbot campaign, which occurred last month, uses a new delivery method in which an email is sent to the target individuals along with an attachment containing protected PDF files. Once these are downloaded, the Qbot malware will be installed on the device. The researchers found that the malspam was sent in multiple languages, meaning organizations could be targeted worldwide. Mirai, one of the most popular IoT malware, also made a comeback last month. Researchers discovered that Mirai exploits a new zero-day vulnerability (CVE-2023-1380) to attack TP-Link routers and add them to its botnet, which is used for some of the most distributed...

Read more

EU Cyber ​​Solidarity Law: Building a protective shield
EU Cyber ​​Solidarity Law: Building a protective shield

In April, the European Commission put forward a proposal for the EU Cyber ​​Solidarity Law, a multi-billion dollar plan to boost cybersecurity capabilities in EU member states. A comment from Peter Sandkuijl, VP Sales Engineering EMEA at Check Point Software Technologies. The plan aims to help build a large-scale, comprehensive European cyber defense program. The law states that the EU Cyber ​​Solidarity Act will strengthen solidarity at Union level to better detect serious cybersecurity incidents and large-scale cybersecurity incidents. He will also help improve preparedness and response measures by building a European Cyber ​​Defense Shield and a…

Read more