News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

German corporate networks threatened by attacks
Kaspersky_news

According to a recent IT security study, the corporate network of every second German organization is the target of cyber attacks. Around 40 percent of them already have malicious code running on their company networks. In one third of cases, this is due to errors made by their own employees. Companies in Germany are confronted with a wide range of security incidents. This is shown by the current IT Security Economics Report from Kaspersky. Cyber ​​criminals can exploit vulnerabilities - both technical and human - to steal sensitive data or disrupt work processes. They have a wide range of entry points in companies that they can use. As the...

Read more

Attacks in 2024: Login credentials were the most common target
B2B Cyber ​​Security ShortNews

A report analyzed cyberattacks in 2024 and found that most attackers do not break in, but log in with stolen credentials. In addition to personal data, health information was the target of most cyber incidents. In 57 percent of successful attacks, cybercriminals used a compromised user account to gain access to the systems. This is the result of the analysis of 35 cyber incidents reported to the US Securities and Exchange Commission between January and August 2024, which was presented by data security specialist Varonis Systems in the report "The Identity Crisis: An in-depth report of cyberattacks in 2024". The target...

Read more

Trend: Cybercriminals work together worldwide
Trend: Cybercriminals work together worldwide Image: Bing - AI

Cybercriminals are becoming increasingly agile and collaborating globally. This is demonstrated by Trend Micro's new research report "Bridging Divides, Transcending Borders: The Current State of the English Underground". It highlights significant changes in the English-speaking cybercrime ecosystem, their global impact and the changing threat landscape. The report follows on from an earlier study from 2015 and shows how the English-speaking cyber underground market has changed over the past decade. A wide range of different services are now on offer, including phone and telecom fraud, AI tools for improved operations, access-as-a-service, social engineering tactics...

Read more

AI use: protection and threat to data security in 2025
AI use: protection and threat to data security in 2025

This year, companies should make data security in the cloud a top priority as AI adoption increases. Developing and implementing new security policies for AI tools will be an important step in preventing data leaks. In the coming year, companies will face increasing pressure to secure large-scale AI initiatives while protecting a growing number of data assets from cyber threats. Here are Tenable's key predictions for the future of cloud security: AI adoption and more stringent security As the technology becomes more widely available, more and more companies will incorporate AI into their infrastructure and...

Read more

Ransomware: Typical Attack Steps of a Cyber ​​Attack
Ransomware: Typical Attack Steps of a Cyber ​​Attack

After a cyberattack, it is difficult to reconstruct the course of the attack. A leading cybersecurity provider has analyzed the attack steps that typically occur in a ransomware attack. On this basis, companies can derive security measures for the future. aDvens, one of the leading independent cybersecurity companies in Europe, has analyzed the typical course of a cyberattack (apart from attacks that are not based on financial motives - for example sabotage) using data from its Security Operations Center and identified three different steps: 1. Attack step: initial access In this step, attackers gain access in a discreet manner and...

Read more

Olympic Games targeted by cyber criminals
Olympic Games targeted by cyber criminals

After the European Football Championship, the next major event is just around the corner. The Summer Olympics in Paris are not only likely to captivate sports fans all over the world, but also attract the attention of cyber criminals. However, this is nothing new, as the history of cyber attacks shows. There have been predictions since 2004 that the Olympic Games could also be the target of cyber attacks. But although no games have been seriously affected so far, there is reason to believe that this year could be different. With the increasing…

Read more

Countries of origin of cybercriminals
B2B Cyber ​​Security ShortNews

In our current era, crime is increasingly moving digital, with the number of cyber threats increasing dramatically in recent years. To identify the countries with the highest levels of cybercrime, a research team has now developed the first World Cybercrime Index. At the top of this index, which identifies countries with the highest levels of cybercrime, are countries such as Russia, Ukraine, China, the USA and Nigeria. Surprisingly, the United Kingdom is also in the top ten. For Germany and other European countries this means that they...

Read more

Cybercriminals are learning
B2B Cyber ​​Security ShortNews

Security researchers have released the 2024 Incident Response Report, which paints a worrying picture of increasing cyber threats. The insights are based on data that Unit 42 collects through its daily work: The incident response and threat intelligence teams help companies assess, respond to and recover from cyberattacks. The 2024 Incident Response Report shows that threat actors are becoming more sophisticated: they are more organized, work in specialized teams for different steps of attacks, and use IT, cloud and security tools. They work more and more efficiently because they have processes and playbooks...

Read more

Campaigns by cybercriminal group TA4903
B2B Cyber ​​Security ShortNews

Cybersecurity experts have identified new campaigns by cybercriminal group TA4903, which specializes in phishing and business email compromise (BEC, also known as CEO fraud). The group is a group of financially motivated cyber criminals who have recently made a name for themselves through large-scale email campaigns. US organizations in particular find themselves in the crosshairs of attackers, and occasionally companies from other parts of the world too. Proofpoint's key takeaways from TA4903: TA4903 has two main goals: credential phishing and BEC. The group regularly runs campaigns where they present themselves as…

Read more

The Bumblebee malware is back
B2B Cyber ​​Security ShortNews

The Bumblebee malware is being used again by cybercriminals after an absence of several months. IT security experts recently identified an email campaign that misused the brand of electronic device manufacturer Humane to trick recipients into downloading the Bumblebee malware. The return of Bumblebee comes amid a rise in cybercriminal activity following a long absence of many cybercriminals and certain types of malware. The cybercriminal groups TA576 and TA866 recently resurfaced with email campaigns after months of activity. Post-exploitation operator TA582 and aerospace-focused group TA2541 both resurfaced in late January...

Read more