News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Analyst report: Detection and response pays off
Trend Micro News

The use of solutions to detect and combat cyber attacks - detection and response - in the entire IT infrastructure (XDR) pays off for companies. This is confirmed by a new study by the analyst firm ESG, which is available as a study. The companies surveyed stated that thanks to the intelligent use of data from several networked security solutions, they can identify threats more quickly and are less burdened by false positives. Cyber ​​threat detection has become more difficult ESG's survey found that 85 percent of companies found that detecting and responding to cyber threats - ...

Read more

Armed against cyber attacks and data loss
Network backup

The aim of an effective cyber resilience strategy is to ensure that a company's business operations remain secure in the event of cyber attacks or data loss. The concept includes security, IT infrastructure, business processes and business continuity. Cyber ​​resilience is therefore a preventive measure to comprehensively counteract the effects of malware, insider threats, human error as well as software and hardware errors. How cyber resilience works: The four main components 1. Threat protection: Measures against malware attacks and data misuse As technologies advance, so does the number of sophisticated cyber attacks. Viruses, worms, bots, Trojans or keyloggers, common forms of malware not only have a high potential for damage, but are also ...

Read more

Top 5 phishing attacks
Phishing attack company

Phishing attacks are booming. This not only affects the individual consumer, companies are also increasingly feeling the consequences of these cyber attacks. With e-mails and other messages as “Trojan horses” for malware, hackers are increasingly able to get company and customer data, extort ransom for them and even paralyze entire businesses. The phishing attacks are becoming more and more obscure: they manage to appear very authentic under the guise of bills, business e-mails or private messages. Many managers are desperate and are even ready to pay ransom in the millions to save their business….

Read more

Hackers target the US election campaign
Fireeye News

Microsoft warns of cyber attacks on people and organizations associated with the US election campaign. John Hultquist, Senior Director of Analysis at Mandiant Threat Intelligence, is particularly concerned about the aggressive campaigns of the Russian military intelligence service. “Political cyber espionage activities have in common that they target political organizations, because parties and campaigns are good sources of information about planned politics. The APT28 hacker group has a unique history that leads to fears that devastating activities and information campaigns may be launched upon us. Russian military intelligence service regularly violates international norms In addition to the hacking campaign ...

Read more