News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Chinese cyber espionage is increasing dramatically
Chinese cyber espionage is increasing dramatically

The 2025 Global Threat Report reveals increasing aggressiveness of Chinese cyberespionage, a rise in GenAI-based social engineering and vulnerability research and exploitation by nation-state actors, and a sharp increase in malware-free, identity-based attacks. According to the report, state-sponsored cyber operations by China-affiliated attackers increased by 150%, with targeted attacks in the financial services, media, manufacturing, and industrial sectors increasing by up to 300%. At the same time, attackers worldwide are leveraging AI-generated deception, using stolen credentials, and increasingly conducting cross-domain attacks by exploiting vulnerabilities in endpoints, clouds, and other security threats.

Read more

Agentic AI in cybersecurity
Agentic AI in cybersecurity

A company has announced groundbreaking innovations in Agentic AI, powered by NVIDIA AI software, that set a new standard for AI-based cybersecurity. Running NVIDIA NIM microservices internally, CrowdStrike Charlotte AI Detection Triage enables automated detection triage at twice the speed of the original launch version and using 50% fewer compute resources, reducing alert fatigue and maximizing SOC efficiency. The CrowdStrike and NVIDIA collaboration paves the way for the next era of cybersecurity with advanced reasoning models that enable even smarter automation, making decisions…

Read more

Data security: Backup strategy is the backbone
B2B Cyber ​​Security ShortNews

As a result of the faulty CrowdStrike update this summer, almost every second affected company in Germany experienced operational downtime of around ten hours. This underlines the importance of an effective backup strategy to protect sensitive data. The CrowdStrike incident has certainly proven that companies of all sizes and industries are vulnerable to serious IT disruptions. But this only highlights once again the urgent need for a robust and multi-layered backup strategy as a central component of the cyber resilience strategy. Because it is no longer a question of "if" but of "when" a...

Read more

CrowdStrike Analysis: Failures, Consequences, Prevention  
CrowdStrike analysis: failures, consequences, prevention Image: Bing - AI

The BSI and Bitkom present the results of a joint company survey on the consequences of the IT outage caused by CrowdStrike for German companies. Almost half of the companies affected had to temporarily cease operations. Cancelled flights, failed servers and PCs, companies that had to send their employees home - on July 19, 2024, nothing was working in many places. A faulty update of a cybersecurity solution from the company CrowdStrike had led to numerous IT outages worldwide. The Federal Office for Information Security (BSI) and the…

Read more

Danger of election manipulation through cyber attacks
Danger of election manipulation through cyber attacks

Cyber ​​attackers are attempting to influence elections around the world using generative AI technology. The latest findings from the Global Threat Report 2024 show that more and more attackers are using stolen credentials to exploit gaps in cloud environments while further increasing their stealth, speed and impact. The report also sheds light on the top threats in 2024, including the manipulation of elections around the world and the use of generative AI, which lowers the barrier to entry and enables more sophisticated attacks. In the tenth edition of the cybersecurity leader's annual report, CrowdStrike highlights the…

Read more

Data: Prevent criminal exfiltration
Data: Prevent criminal exfiltration the easy way

CrowdStrike's AI-powered Falcon XDR platform eliminates the need for traditional data loss prevention (DLP) products. It protects end devices and prevents exfiltration and loss of data. Many organizations struggle with traditional DLP solutions that are difficult to implement and manage and cannot comprehensively monitor data in the modern cloud and AI era. The result is risky implementations that only work in audit mode and cannot prevent data theft. CrowdStrike Falcon Data Protection leverages the industry-leading visibility and protection of the CrowdStrike Falcon platform to protect critical data from insider threats and attackers and...

Read more

AI-based cyber defense for SMEs at Amazon
B2B Cyber ​​Security ShortNews

In contrast to large companies, many SMEs still use traditional cyber defense solutions and are therefore highly at risk. AI-powered defense offers more security. CrowdStrike's AI-powered cybersecurity offering for small and medium-sized businesses (SMBs), CrowdStrike Falcon Go, is now available on Amazon Business. Falcon Go is designed to help SMBs defend against modern cybersecurity threats. Support for small IT teams and non-technical users It combines the power of CrowdStrike's industry-leading protection in an intuitive, simplified package designed to support smaller IT teams and non-technical users. It is…

Read more

SMEs: Stop ransomware attacks
SMEs: Stop ransomware attacks

Cyberattacks are becoming increasingly sophisticated and are able to overcome well-known antivirus products. SMEs in particular are at risk. A new solution helps you stop attacks and protect your data. CrowdStrike announced a new, groundbreaking version of CrowdStrike Falcon® Go, giving small and medium-sized businesses the protection they need to stop ransomware attacks and prevent data breaches. With just a few clicks, small and medium-sized businesses gain the ability to quickly and easily implement industry-leading protection to stop modern cyberattacks missed by ineffective antivirus products. CrowdStrike is…

Read more

Mobile phishing attacks are on the rise
Mobile phishing attacks are on the rise

According to the report “The Global State of Mobile Phishing”, more than half of mobile work devices were the target of a mobile phishing attack in 2022. This led to high costs for companies. While remote employment has already become a new reality for companies around the world, many of them are still struggling to reliably secure the new mobile environments. 2022 highest number of mobile phishing attacks According to the report “The Global State of Mobile Phishing” published by Lookout, the…

Read more

Threat Hunting Report 2023: Identity-based attacks are on the rise
B2B Cyber ​​Security ShortNews

The new Threat Hunting Report considers attack trends and tactics between July 2022 and June 2023. Key findings of the report include: The average breakout time – the time it takes attackers to move laterally from a victim's environment moving compromised host to the next – hits a new low of 79 minutes (up from 84 minutes in 2022). The shortest breakout time of the year was a record time of just 7 minutes. Credential Abuse Attackers are increasingly using identity-based attacks: 62 percent of interactive…

Read more