News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​danger: HTML smuggling
Cyber ​​danger: HTML smuggling

With HTML smuggling, the malicious file is first created on the user's computer. Therefore, traditional anti-malware programs and sandboxes do not detect the attack. AI-based browser isolation provides protection. HTML smuggling is a highly efficient malware distribution technique that uses legitimate HTML5 and JavaScript functions to infect. This smuggling technique distributes Remote Access Trojans (RATs), banking malware, and other malicious payloads because HTML smuggling bypasses traditional security controls such as web proxies, email gateways, and legacy sandboxes. Attackers hide their activities in seemingly harmless web traffic, making it difficult for security tools to...

Read more

Danger of election manipulation through cyber attacks
Danger of election manipulation through cyber attacks

Cyber ​​attackers are attempting to influence elections around the world using generative AI technology. The latest findings from the Global Threat Report 2024 show that more and more attackers are using stolen credentials to exploit gaps in cloud environments while further increasing their stealth, speed and impact. The report also sheds light on the top threats in 2024, including the manipulation of elections around the world and the use of generative AI, which lowers the barrier to entry and enables more sophisticated attacks. In the tenth edition of the cybersecurity leader's annual report, CrowdStrike highlights the…

Read more

Cyber ​​attacks are the main reason for business failures
Cyber ​​attacks are the main reason for business failures

A leading provider of data protection and ransomware recovery solutions by market share, releases the results of its fifth annual report. While companies say they will spend more money to defend against cyberattacks, the survey also found that IT leaders feel even less protected and are more concerned about their ability to recover business-critical data. Cyberattacks remain the leading cause of outages, and data shows that while organizations are increasingly turning to the cloud for major recoveries, only a small percentage believe they...

Read more

Cyber ​​attacks are becoming increasingly sophisticated
Cyber ​​attacks are becoming increasingly sophisticated

A leading provider of zero-trust and zero-knowledge solutions for protecting credentials, privileged access and remote connections, releases key findings from its latest study on current cybersecurity developments. The global survey of more than 800 IT security leaders found that the vast majority (95 percent) believe cyberattacks are now more sophisticated than ever before. AI-powered attacks are the most serious and phishing attacks are widely believed to be the fastest growing. Looking ahead to 2024, the cybersecurity landscape presents a mix of frightening factors, with emerging AI threats looming large…

Read more

Allianz Risk Barometer: Cyber ​​attacks top risk 2024
B2B Cyber ​​Security ShortNews

Cyber ​​incidents such as ransomware attacks, data breaches and IT failures are the biggest risk for companies worldwide this year. The closely linked business interruptions follow in second place. For the current Allianz Risk Barometer, more than 3.000 risk experts from 92 countries were surveyed about their top company risks. Among the German participants in the study, cyber attacks and business interruptions also take first place (1: 2023) and second place (2: 2). Unlike worldwide, however, changes to laws and regulations - such as tariffs, sanctions or protectionist efforts - rank third (2023: 1). It is striking that in…

Read more

2024: AI-assisted cyberattacks on the rise
2024: AI-assisted cyberattacks on the rise

Trend Micro's 2024 cybersecurity predictions warn of the transformative role of generative artificial intelligence (AI) in the cyber threat landscape, as well as a new wave of sophisticated social engineering tactics and identity theft using AI-powered tools . The widespread availability and improved quality of generative AI combined with Generative Adversarial Networks (GANs) to generate realistic photo, audio and video content will have a lasting impact on the phishing landscape in 2024. Trend Micro predicts a new wave of Business Email Compromise (BEC ), virtual kidnapping and other scams – triggered by the cost-effective…

Read more

Security cloud with AI against cyber attacks
AI against cyberattacks

The new AI companion for the Security Cloud category is intended to simplify and automate cyberattack response and recovery. Included is Microsoft's Azure OpenAI in combination with its data threat engine based on machine learning. Artificial intelligence (AI) can help IT and security professionals better respond to cyber incidents. That's why Rubrik, the zero trust data security company, announces the generative AI companion Rubrik Ruby. This is available in the Security Cloud section and is intended to accelerate cyber detection, recovery and resilience. AI: Azure OpenAI and Data Threat Engine…

Read more

Malicious site hopping
B2B Cyber ​​Security ShortNews

Recently, a new technique for bypassing security scanners has been increasingly used, namely “site hopping”. This technology is subject to constant development, which makes it more difficult to detect, but not impossible. Historically, there have been similar phenomena to jumping on trains. People without a ticket took the opportunity to walk alongside moving trains and jump into the last carriage that suited their needs in order to travel. This practice constituted an abuse of a legitimate service as long as it met travel needs. It is striking how parallels emerge between such historical phenomena and...

Read more

BND: LNG terminals possible targets of cyber attacks
LNG terminals possible targets of cyber attacks

The BND warns of cyber attacks on German LNG (liquefied natural gas) terminals. The threat to critical infrastructure is greater than ever. The war in cyberspace is becoming internationalized far beyond the actual crisis regions. A few days ago, the President of the BND (Federal Intelligence Service), Bruno Kahl, warned of cyber attacks on the new LNG (liquefied natural gas) terminals in Germany. Since the Russian attack on Ukraine, it has become clear that the war in cyberspace is becoming internationalized and leaving traces beyond the actual crisis region. Among other things, Germany is relying on LNG as an alternative to Russian gas supplies and is rapidly building...

Read more

DDoS: Protection against cyberattacks with automated real-time analysis
DDoS: Protection against cyberattacks with automated real-time analysis

NETSCOUT has introduced its Adaptive DDoS Protection for its Arbor® Threat Mitigation System (TMS). The system improves the detection of distributed attacks that dynamically change vectors and target numerous IP addresses simultaneously, including carpet bombing. NETSCOUT ASERT, the company's expert security research and DDoS attack defense team, has documented a significant increase in dynamic distributed denial of service (DDoS) attacks that utilize multiple vectors and techniques to attack botnet-based, direct-to-consumer attacks. To launch path, state exhaustion and application layer attacks. These are designed to bypass traditional static network and cloud-based DDoS defenses. Carpet bombing attacks have increased by more than 110%...

Read more