News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Robust defense against ransomware 
Robust defense against ransomware

Cyber ​​extortionists are constantly developing new ways to inject ransomware into organizations. Using tactics like brand phishing, they impersonate big names like PayPal to send bogus payments. Businesses should keep 5 things in mind to have a more robust defense against ransomware. The developers behind the ransomware Hive alone were able to steal around 100 million US dollars through blackmail. The Lockbit cybergang wants 50 million US dollars from Continental AG to restore a 40 terabyte data package. Ransomware evolves quickly, and potential victims need to do the same. How can…

Read more

OpenAI: Cyber ​​criminals use ChatGPT
B2B Cyber ​​Security ShortNews

Security researchers performed a full infection flow using ChatGPT in December, from crafting a convincing spear-phishing email to running a reverse shell capable of accepting English-language commands. At the time, the question arose whether this was just a hypothetical threat or whether there were already threat actors using OpenAI technologies for malicious purposes. Analysis of several major underground hacking communities conducted by Check Point Research (CPR) shows that cybercriminals are already beginning to use OpenAI to develop malicious tools. As suspected by the security experts,…

Read more

ChatGPT: AI-designed malicious emails and code
B2B Cyber ​​Security ShortNews

Check Point's security research department warns of hackers who could use OpenAI's ChatGPT and Codex to launch targeted and efficient cyberattacks. The intelligence can create phishing emails and generates dangerous VBA code for Excel files. In experimental correspondence, Check Point Research (CPR) tested whether the ChatBot could be used to create malicious code to initiate cyber attacks. ChatGPT (Generative Pre-trained Transformer) is a free-to-use AI chatbot that can provide its users with contextual answers based on data found on the internet. Codex, on the other hand, is an OpenAI…

Read more

Electric cars: cyber threat to charging stations
Electric cars: cyber threat to charging stations

If the IT security of the charging stations continues to be neglected, this could slow down the progress of electric vehicles in society and offer new targets for hackers. Because these are simply other IoT devices connected to the Internet. The virtual threats of EV charging stations are becoming more and more real. This could delay the spread of electric vehicles and hamper government mandated efforts to combat climate change. The target set by the federal government is, for example, to reduce emissions from traffic by 2030 to 40 percent by 42. Meanwhile, the European Parliament is aiming for a complete ban on…

Read more

More protection for SMBs against ransomware
More protection for SMBs against ransomware

In 2022 alone, a total of 61 percent of all cyber attacks were aimed at small and medium-sized enterprises - SMEs. Ransomware was particularly successful. Therefore, the protection must be improved and also fit into the budget. Ransomware – a threat we are all increasingly aware of and would prefer to stay away from. It affects every sector and the attacks are becoming more frequent and more sophisticated. Yet few small and medium-sized enterprises (SMEs) are aware that they are just as, if not more, at risk than larger companies….

Read more

Cloud security: Secure access against hackers 
Cloud security: Secure access against hackers

Therefore, when a company moves its data and workloads to the cloud, it opens up significantly more avenues for hackers to penetrate. The challenge of protecting them is therefore greater than ever: In the current Cloud Security Report, 76 percent of those surveyed stated that they use two or more clouds in their everyday work. To understand how best to protect cloud assets, consider the analogy of a door. Suppose every security door consists of a number of components that fit together. All the individual parts together form the structure of each door: hinges, handles, locks,...

Read more

SMEs are slowed down by insufficient IT security
SMEs are slowed down by insufficient IT security

Despite increased budgets, small and medium-sized businesses (SMEs) are unprepared for the dangers that come with growth, according to a Check Point survey. This is shown by a current study on the subject of “IT security for small and medium-sized companies”. Check Point Software Technologies Ltd., a leading global provider of cyber security solutions, has released the results of a new survey by market research firm Analysys Mason on the IT security of small and medium-sized businesses (SMBs). The aim of the study was to find out how SMEs survived the pandemic and how their business and technological needs are changing. The survey found that…

Read more

IoT security cameras: a found fodder for hackers
IoT security cameras: a found fodder for hackers

IoT security cameras are connected to both the company network and the Internet, and transmit large amounts of data to recording systems in the company or in the cloud. Implementation should be rigorously planned and ongoing monitoring implemented. Since these points are often neglected, IoT security cameras are often a target for hackers. Internet-connected security cameras can be found everywhere these days - in public institutions, businesses and even in homes. The market is estimated to be around $2021 billion in 50 and is growing rapidly. Every day, hundreds of thousands of IoT security cameras are deployed worldwide...

Read more