News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Threat potential from state actors
Threat potential from state actors

The extent of the current threat situation is illustrated by a cyber attack that recently occurred in Ukraine. According to Ukraine's State Computer Emergency Response Team (CERT-UA), an unnamed state-owned company was compromised, infecting around 2.000 computers with the DIRTYMOE (PURPLEFOX) malware. It is a modular malware that allows attackers remote access and is primarily used for distributed denial-of-service (DDoS) attacks. The exact impact on Ukrainian operations was not disclosed. Globally, the number of cyberattack attempts increased by more than 2023 in 104…

Read more

Cyber ​​attack: Battery manufacturer VARTA partially paralyzed 
B2B Cyber ​​Security ShortNews

The battery manufacturer VARTA, based in Ellwangen, recently reported a cyber attack on its systems. The attack is probably so extensive that some locations in Germany, Romania and Indonesia cannot produce. It is not yet clear which APT group attacked the battery manufacturer VARTA, but the attack probably led to a standstill in production. According to Handelsblatt, German production in Ellwangen, Dischingen and Nördlingen is affected. In addition, the attack is also said to have affected the plants in Romania and Indonesia. Overall, the…

Read more

Another cyber attack on the hospital
B2B Cyber ​​Security ShortNews

Hackers have paralyzed the IT system and telecommunications at the Lindenbrunn Hospital in Coppenbrügge (Hameln-Pyrmont district). The unknown perpetrators demanded money to make the systems available again. However, the hospital did not respond to this. How the perpetrators were able to break into the IT systems is being investigated. The hospital reports that patient care is not at risk. However, improvisation is necessary: ​​instead of digital patient files, written files are being created again. “There is currently no indication as to whether patient or resident data is affected,” it says on the hospital’s website. "As part of a…

Read more

Proactive: Investing in IT security as a business strategy
Proactive: Investing in IT security as a business strategy

IT security is not just an investment that ensures the protection of company assets. It also creates significant added value for customers and enables new business models. This is one of the key findings of a study by Trend Micro. Trend Micro, in collaboration with the Brandenburg Institute for Society and Security (BIGS), surveyed 300 IT and IT security executives about, among other things, their investment behavior. Not just a protective shield, but also a catalyst for flourishing business models and customer satisfaction - this is a reality for those companies that are increasingly investing in IT security and proceeding strategically. They report…

Read more

Cyber ​​attack on German Energy Agency – dena
B2B Cyber ​​Security ShortNews

According to its own information, the German Energy Agency reported a cyber attack on the weekend of November 11th to 12th. The servers are currently all shut down and accessibility is only limited. At least the homepage still functions as a source of information. Almost nothing is going on at dena at the moment. After the cyber attack at the weekend, the entire IT infrastructure was shut down or damaged. There is no exact information available yet. It is not yet clear who attacked Dena. As a result of the attack, dena has been largely unable to work technically and neither by...

Read more

Malware scripts indelibly hidden in blockchain
Malware scripts indelibly hidden in blockchain

Attackers first hid malware and malicious scripts as a data source on Cloudflare. When Cloudflare reacted and wanted to delete the data, the attackers came up with a new idea: they hid them disguised as cryptocurrency transactions (smart contract) in the immutable Binance Smart Chain (BSC) blockchain. With the so-called ClearFake, website visitors receive a message that their browser is out of date and needs to be updated. If the visitor clicks on the link, malware files are automatically reloaded from a compromised Cloudflare worker host. So much for the known chain of attacks. “EtherHiding” – undeletable malware in blockchain But as…

Read more

After Cyberattack: Accelerating Recovery for VMware
After a cyber attack: Accelerating recovery for VMware - Image by Hans on Pixabay

Rubrik introduces new generative AI capabilities for VMware with Rubrik AI-Powered Cyber ​​Recovery. Using generative AI and large language models (LLMs), the new solution helps administrators make difficult decisions after cyberattacks to minimize data loss and reduce downtime. Additionally, the features enable backup administrators to deploy recommended task lists and guided workflows to ensure efficient data recovery and maintain cyber resilience. Cyberattacks pose one of the greatest threats to enterprise virtual machines. Maintaining cyber resilience in the face of cyberattacks requires the ability to protect critical data such as virtual…

Read more

Frightening: Cyber ​​attack via stolen GPU pixels in the browser 
B2B Cyber ​​Security ShortNews

Cyber ​​attack: Researchers stole the cached, compressed GPU graphics data values ​​from a browser using side channel analysis, reconstructed them using machine learning (ML), and thus obtained website login data and other sensitive data. How the whole thing works sounds shockingly simple - but you can also protect yourself! In a research paper, researchers from Austin Texas, Carnegie Mellon, Washington and Illinois Urbana-Champaign universities present a method for carrying out a side-channel attack on graphics card GPUs that can be used to obtain sensitive information from running programs. This “pixel theft” and their values ​​– artifacts –…

Read more

Hacker groups: Another German university attacked
B2B Cyber ​​Security ShortNews

Some APT groups have specialized in the education sector, as systems there are often outdated or access is easier to obtain. Now Furtwangen University (HFU) has also been hit. The University of Kaiserslautern was hit in July and, according to the attacker, over 240 GB of data was stolen. Furtwangen University (HFU) doesn’t have much to report. There is currently only a meager indication on the homepage that the school has been relatively paralyzed by a cyber attack. Students and schools only find the note: “Dear students and prospective students, dear...

Read more

More vulnerabilities in MOVEit
B2B Cyber ​​Security ShortNews

The threat obviously goes further: discovery of another vulnerability for unauthorized SQL injection. MOVEit needs to be patched again to prevent cyberattacks. Vulnerabilities are discovered every day, and attackers keep checking to see if they can monetize a new vulnerability. When a new vulnerability is confirmed, we as defenders need to consider two things: how difficult it would be for the attackers to exploit the vulnerability, and how likely it is that it will be exploited. The latter usually depends on the degree of distribution of the affected software: the more widespread it…

Read more