News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Efficient attack tools: How hackers use AI LLMs for their own purposes

The use of AI can automate routine tasks, make processes more efficient and increase productivity. This applies to the legal economy as well as, unfortunately, to organized cybercrime. Large Language Models (LLM) in particular are used by criminal actors - less as visionary all-rounder technologies, but rather as efficient tools for improving standard attacks. Large Language Models (LLMs) like ChatGPT have been in the public eye since the end of 2022. This raises the question of what effects they have on cybersecurity if hackers misuse them to create malicious content. When using LLMs…

Read more

Cyber ​​danger: HTML smuggling
Cyber ​​danger: HTML smuggling

With HTML smuggling, the malicious file is first created on the user's computer. Therefore, traditional anti-malware programs and sandboxes do not detect the attack. AI-based browser isolation provides protection. HTML smuggling is a highly efficient malware distribution technique that uses legitimate HTML5 and JavaScript functions to infect. This smuggling technique distributes Remote Access Trojans (RATs), banking malware, and other malicious payloads because HTML smuggling bypasses traditional security controls such as web proxies, email gateways, and legacy sandboxes. Attackers hide their activities in seemingly harmless web traffic, making it difficult for security tools to...

Read more

Danger of election manipulation through cyber attacks
Danger of election manipulation through cyber attacks

Cyber ​​attackers are attempting to influence elections around the world using generative AI technology. The latest findings from the Global Threat Report 2024 show that more and more attackers are using stolen credentials to exploit gaps in cloud environments while further increasing their stealth, speed and impact. The report also sheds light on the top threats in 2024, including the manipulation of elections around the world and the use of generative AI, which lowers the barrier to entry and enables more sophisticated attacks. In the tenth edition of the cybersecurity leader's annual report, CrowdStrike highlights the…

Read more

Cyber ​​attacks are the main reason for business failures
Cyber ​​attacks are the main reason for business failures

A leading provider of data protection and ransomware recovery solutions by market share, releases the results of its fifth annual report. While companies say they will spend more money to defend against cyberattacks, the survey also found that IT leaders feel even less protected and are more concerned about their ability to recover business-critical data. Cyberattacks remain the leading cause of outages, and data shows that while organizations are increasingly turning to the cloud for major recoveries, only a small percentage believe they...

Read more

Cyber ​​attacks are becoming increasingly sophisticated
Cyber ​​attacks are becoming increasingly sophisticated

A leading provider of zero-trust and zero-knowledge solutions for protecting credentials, privileged access and remote connections, releases key findings from its latest study on current cybersecurity developments. The global survey of more than 800 IT security leaders found that the vast majority (95 percent) believe cyberattacks are now more sophisticated than ever before. AI-powered attacks are the most serious and phishing attacks are widely believed to be the fastest growing. Looking ahead to 2024, the cybersecurity landscape presents a mix of frightening factors, with emerging AI threats looming large…

Read more

Allianz Risk Barometer: Cyber ​​attacks top risk 2024
B2B Cyber ​​Security ShortNews

Cyber ​​incidents such as ransomware attacks, data breaches and IT failures are the biggest risk for companies worldwide this year. The closely linked business interruptions follow in second place. For the current Allianz Risk Barometer, more than 3.000 risk experts from 92 countries were surveyed about their top company risks. Among the German participants in the study, cyber attacks and business interruptions also take first place (1: 2023) and second place (2: 2). Unlike worldwide, however, changes to laws and regulations - such as tariffs, sanctions or protectionist efforts - rank third (2023: 1). It is striking that in…

Read more

2024: AI-assisted cyberattacks on the rise
2024: AI-assisted cyberattacks on the rise

Trend Micro's 2024 cybersecurity predictions warn of the transformative role of generative artificial intelligence (AI) in the cyber threat landscape, as well as a new wave of sophisticated social engineering tactics and identity theft using AI-powered tools . The widespread availability and improved quality of generative AI combined with Generative Adversarial Networks (GANs) to generate realistic photo, audio and video content will have a lasting impact on the phishing landscape in 2024. Trend Micro predicts a new wave of Business Email Compromise (BEC ), virtual kidnapping and other scams – triggered by the cost-effective…

Read more

Security cloud with AI against cyber attacks
AI against cyberattacks

The new AI companion for the Security Cloud category is intended to simplify and automate cyberattack response and recovery. Included is Microsoft's Azure OpenAI in combination with its data threat engine based on machine learning. Artificial intelligence (AI) can help IT and security professionals better respond to cyber incidents. That's why Rubrik, the zero trust data security company, announces the generative AI companion Rubrik Ruby. This is available in the Security Cloud section and is intended to accelerate cyber detection, recovery and resilience. AI: Azure OpenAI and Data Threat Engine…

Read more

Malicious site hopping
B2B Cyber ​​Security ShortNews

Recently, a new technique for bypassing security scanners has been increasingly used, namely “site hopping”. This technology is subject to constant development, which makes it more difficult to detect, but not impossible. Historically, there have been similar phenomena to jumping on trains. People without a ticket took the opportunity to walk alongside moving trains and jump into the last carriage that suited their needs in order to travel. This practice constituted an abuse of a legitimate service as long as it met travel needs. It is striking how parallels emerge between such historical phenomena and...

Read more

BND: LNG terminals possible targets of cyber attacks
LNG terminals possible targets of cyber attacks

The BND warns of cyber attacks on German LNG (liquefied natural gas) terminals. The threat to critical infrastructure is greater than ever. The war in cyberspace is becoming internationalized far beyond the actual crisis regions. A few days ago, the President of the BND (Federal Intelligence Service), Bruno Kahl, warned of cyber attacks on the new LNG (liquefied natural gas) terminals in Germany. Since the Russian attack on Ukraine, it has become clear that the war in cyberspace is becoming internationalized and leaving traces beyond the actual crisis region. Among other things, Germany is relying on LNG as an alternative to Russian gas supplies and is rapidly building...

Read more