News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Germany: 223 billion euros in damage from cyber attacks
Germany: 223 billion euros in damage from cyber attacks

According to a Bitkom study, cyber attacks cause 223 billion euros in damage to the German economy every year. Ransomware and blackmail software accounts for around 20 percent of these. Three ways out of the ransom trap. The hackers encrypt data, fail systems and, increasingly, steal data from their victims' networks. In an open letter, a group of IT security and information technology experts called on federal politicians to take action and demanded specific legal measures to counteract ransom payments, among other things. Paying ransom is the wrong way The need for action is undisputed and ransom…

Read more

Managed services on course for growth - fear of cyber attacks is increasing

Barracuda MSP Report: Managed Services Continue to Grow as Customer Fears of Cyber ​​Attacks Rise. Increasing security regulations unsettle MSPs. Manufacturer support and training is becoming increasingly important. On the occasion of Barracuda's Global MSP Day this year, the cloud security specialist traditionally announces the results of the fifth edition of its study The Evolving Landscape of the MSP Business. Once again, managed service providers have been extremely positive about growth in this area. After all, last year 53 percent of income came from managed services, by 2022 those surveyed expect 63...

Read more

Cyber ​​Attacks: Industry hardest hit
Cyber ​​Attacks: Industry hardest hit

For the first time in five years, there are more cyberattacks on the manufacturing industry. It has thus overtaken the financial and insurance industry in terms of the number of attacks measured. This is shown by the current X-Force Threat Intelligence Index 2022 from IBM. Most attacks on production involve exploiting vulnerabilities (47%) and phishing (40%). Cyber ​​criminals exploit the important role of manufacturing in global supply chains in order to disrupt them. Also, manufacturers have a low tolerance for downtime. Ransomware takes advantage of the pandemic In addition, ransomware takes advantage of the stress situation aggravated by the pandemic…

Read more

Chronicle of cyber attacks on Ukraine
Eset_News

The Russian invasion of Ukraine was not the starting signal for increased cyber attacks. ESET has been observing attacks and espionage actions on authorities, companies and institutions in the Eastern European country since 2014. A constantly updated overview of ESET. There are repeated cyber attacks on critical infrastructures in Ukraine. For example, at the end of 2015, the power grid in a Ukrainian region was shut down, leaving around 1,5 million people without electricity for hours. The experts of the European IT security manufacturer have created their own category on WeLiveSecurity, which contains all analyzes and reports...

Read more

2022: Trend Micro expects positive development in defense against cyber attacks
Trend Micro News

Trend Micro, one of the world's leading providers of cybersecurity solutions, predicts that global companies will be better prepared for cyber attacks in 2022. The experts advise companies to take a comprehensive and proactive cloud-first approach to mitigating cyber risks. Trend Micro researchers expect threat actors to concentrate on attacking data center and cloud workloads as well as particularly vulnerable services using ransomware in 2022. They will try to use the large number of employees who continue to work from home for themselves. According to the study, vulnerabilities are identified in record time as ...

Read more

Data classification: effectively sifting through and protecting data treasures

The amount of data in companies is growing exponentially today. The challenge for security teams is to properly protect this data from potential cyber attacks within the available time, budget and human resources. The best way to cope with this task is to properly prioritize the data. Data classification plays a crucial role here, as this technology helps companies to effectively enforce their requirements for risk management, compliance and data security. Basics of data classification Data classification is generally defined as the process of organizing data into relevant categories so that it can be used and protected more efficiently….

Read more

Advanced truck technology encourages cyberattacks
B2B Cyber ​​Security ShortNews

The more high-tech that is built into truck fleets, the more efficient fleet management becomes. There are also safety aspects in road traffic. But with networking, the risks of a cyber attack on the logistics industry also increase. So-called Advanced Driver Assistance Systems, or ADAS for short, can be found in more and more vehicles, both in cars and in trucks. They should make life easier for the driver, ensure more safety and avoid driving errors. In addition, they enable more efficient and environmentally friendly fleet management, for example through intelligent route planning. But the new systems also harbor risks, because greater networking offers ...

Read more

Connected cars vulnerable to cyberattacks
Connected cars vulnerable to cyberattacks

Trend Micro publishes a new study on the safety of connected cars. This describes various cyber attacks and cyber risks that endanger the safety of the driver and others. The researchers evaluated 29 real attack scenarios using the DREAD threat model for qualitative risk analysis. These attacks can be launched remotely and / or from the victims' vehicles. The study lists the following examples: Evaluated attack scenarios DDoS attacks on Intelligent Transportation Systems (ITS) can influence the communication of the networked vehicle and represent a high risk. Exposed and vulnerable connected car systems are easy to discover, which means that ...

Read more