News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cybercriminals are learning
B2B Cyber ​​Security ShortNews

Security researchers have released the 2024 Incident Response Report, which paints a worrying picture of increasing cyber threats. The insights are based on data that Unit 42 collects through its daily work: The incident response and threat intelligence teams help companies assess, respond to and recover from cyberattacks. The 2024 Incident Response Report shows that threat actors are becoming more sophisticated: they are more organized, work in specialized teams for different steps of attacks, and use IT, cloud and security tools. They work more and more efficiently because they have processes and playbooks...

Read more

Campaigns by cybercriminal group TA4903
B2B Cyber ​​Security ShortNews

Cybersecurity experts have identified new campaigns by cybercriminal group TA4903, which specializes in phishing and business email compromise (BEC, also known as CEO fraud). The group is a group of financially motivated cyber criminals who have recently made a name for themselves through large-scale email campaigns. US organizations in particular find themselves in the crosshairs of attackers, and occasionally companies from other parts of the world too. Proofpoint's key takeaways from TA4903: TA4903 has two main goals: credential phishing and BEC. The group regularly runs campaigns where they present themselves as…

Read more

The Bumblebee malware is back
B2B Cyber ​​Security ShortNews

The Bumblebee malware is being used again by cybercriminals after an absence of several months. IT security experts recently identified an email campaign that misused the brand of electronic device manufacturer Humane to trick recipients into downloading the Bumblebee malware. The return of Bumblebee comes amid a rise in cybercriminal activity following a long absence of many cybercriminals and certain types of malware. The cybercriminal groups TA576 and TA866 recently resurfaced with email campaigns after months of activity. Post-exploitation operator TA582 and aerospace-focused group TA2541 both resurfaced in late January...

Read more

The Swiss army knife for cybercriminals
B2B Cyber ​​Security ShortNews

Security researchers report that cybercriminals are selling tools that allow other hackers to bypass ChatGPT's security restrictions. As early as March 2023, new malware families were discovered using ChatGPT's name to trick users. The scams are often mobile applications or browser extensions that imitate ChatGPT tools. In some cases, the fake tools even offer some ChatGPT features. However, their ultimate goal is to steal the user's credentials. AI-generated malware It is no longer a secret that cybercriminals use ChatGPT to generate malware.

Read more

New scam by cyber criminals
New scam by cyber criminals

Since Microsoft began blocking macros by default in 2022, cybercriminals have experimented with many new tactics, techniques, and procedures (TTPs), including the use of previously rarely observed file types such as virtual hard disk drives (VHD), compiled HTML (CHM), and now OneNote (.one). At the time of analysis, several OneNote malware samples observed by Proofpoint were not detected by numerous antivirus vendors on VirusTotal. While the subjects and senders of the emails vary, almost all campaigns use unique messages to spread malware and typically do not use thread hijacking. The emails usually contain OneNote file attachments...

Read more

Hacker: data is very popular in the dark web
Hacker: data is very popular in the dark web

The illegal trade in data on the dark web is flourishing and the anonymous users who show interest in it or even participate are increasing. Stolen data has a long range and rapid dissemination: If data gets into the dark web, it can spread widely. The data sets provided were accessed 24 times within 1100 hours. Social engineering attack tactics such as phishing not only require technical precautionary measures, but also a corresponding risk awareness on the part of the potential victims. Your behavior can prevent greater damage should an attack occur that bypasses technical protective measures. Increased misbelief ...

Read more

QR codes: Small squares with an underestimated target
B2B Cyber ​​Security ShortNews

Since Corona, the use of QR codes has increased and with it the risk of possible cyber risks. Company smartphones and often used private devices in the home office are also at risk. BullGuard explains what the dangers are. Whether on billboards, business cards, packaging or in magazines - QR codes can be found in all possible areas of life. The small squares with black and white dots act as a bridge from the offline to the online world. QR stands for Quick Response. Because the codes bring users to the Internet in just a few seconds. You need to…

Read more

Cyber ​​criminals gamble with the loot
Trend Micro News

Cyber ​​criminals gamble online for profits from criminal activities such as credit card dumps and personally identifiable information (PII). Cyber ​​criminals are also feeling the effects of the COVID-19 pandemic. Not only have the nature of attacks changed, but also certain criminal activities that emerged during the restricted contact period. The focus is on supposedly mundane leisure activities such as online competitions. What distinguishes this from other online games, however, are the raffled prizes - these often come from cyber attacks. Loot as Winner Prizes Many of the prizes on offer there, which include credit card dumps and personally identifiable information (PII), ...

Read more