News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Second vulnerability found in MOVEit - new patch!
B2B Cyber ​​Security ShortNews

The vulnerability in MOVEit Transfer was discovered on May 31st and caused a stir as it was immediately exploited by the APT group CLOP and stolen a lot of data. The manufacturer immediately offered a patch, which is already out of date, as a second vulnerability was found in which now affects MOVEit Transfer and also MOVEit Cloud. For many companies, the situation is far from over. After the first vulnerability in MOVEit Transfer, the manufacturer Progress Software immediately offered a suitable patch. But the APT group CLOP seems to have had enough time...

Read more

Bitmarck attack: BKKs remain disrupted
B2B Cyber ​​Security ShortNews

Almost 3 weeks ago, the health insurance company's own IT service provider Bitmarck was hit by a cyber attack. As a result, many company health insurance companies, such as the SBK, were paralyzed and have not been available by email, app or normal telephone to date. Currently only emergency numbers work. The first cash registers report that payments in the area of ​​​​sickness and care allowance are possible again. The IT staff at the health insurance companies can't do much else at the moment but wait for Bitmarck's repaired services. Because the IT service provider had to take entire data centers offline after the cyber attack at the end of April...

Read more

APT group Lazarus is behind the cyber attack on 3CX
APT group Lazarus is behind the cyber attack on 3CX

With Operation DreamJob, the APT (Advanced Persistent Threat) group Lazarus attacked Linux users for the first time. The most prominent victim is the VoIP software developer 3CX. ESET experts discover connection to cyber attack on 3CX. The researchers at the IT security manufacturer ESET were able to reconstruct the entire course of the operation and thus prove that the hackers allied with North Korea were behind the so-called supply chain attacks ("supply chain attack"). The mischief takes its insidious course with a fake job offer as a zip file and ends with the SimplexTea malware. The Linux backdoor is distributed via an OpenDrive account. 3CX: It was Lazarus from North Korea...

Read more

Attacks on the supply chain
Attacks on the supply chain

Attackers have always looked for the weakest link in the chain in order to break through a defence. This has not changed in today's highly digitized business world and also includes the supply chain of the supplier industry. Suppliers often have access to their customers' internal systems, and a hack on seemingly insignificant suppliers can mean for hacker groups entry into the network of a global corporation. Attacks via the software supply chain are even more common and have even more dramatic effects. So instead of attacking the targeted company directly, cybercriminals target their software distributors…

Read more

SMBs do not want to work with cyber attack victims
SMBs do not want to work with cyber attack victims

50 percent of SMEs and 64 percent of large companies in Germany would never work with a company that had previously suffered a cyber attack. Certified security measures are desired, but not checked. As a Kaspersky survey shows, 50 percent of SMEs and 64 percent of large companies in Germany do not want to work with other companies that have already been the victim of a cyber attack. It is therefore important for more than three quarters (84,1 percent) of all companies that (potential) partners have implemented certified security measures to protect themselves against cyber attacks. These results go...

Read more

Cyber ​​attack on Continental - what is happening now
Cyber ​​attack on Continental - what is happening now

For a long time there was no statement from Continental on the cyber attack, the theft of 40 TB of data and the ransom demand of first 50 and then 40 million dollars. Continental is now clarifying what happened and how to react. The actual attack on Continental probably took place in August 2022. At that time, Continental announced that everything was fine. It was announced that the attack had been noticed and warded off. But far from it: the hackers were probably still on the Continental network at the time or still had access. In daily operation...

Read more

Cyber ​​security: high priority - high insecurity  
Cyber ​​security: high priority - high insecurity

A study shows that almost half of global executives do not feel well prepared for a cyber attack. And this despite the fact that they also give cybersecurity a high priority. While German executives are the best at assessing cyber vulnerabilities, they need to work on their relationship with the CISO. Proofpoint, Inc., one of the leading next-generation cybersecurity and compliance companies, and Cybersecurity at MIT Sloan (CAMS), an interdisciplinary research consortium, have published their study "Cybersecurity: The 2022 Board Perspective". The report captures what business leaders perceive as the biggest challenges and risks facing their organization. Cyber ​​security at the top...

Read more

dpa attack: Black Basta offers data on the Darknet
B2B Cyber ​​Security ShortNews

As already reported, the IT of the German Press Agency (dpa) was hit by a cyber attack. The perpetrators were probably more successful than expected. According to various sources, the Black Basta hacker group offers the captured data on the dark web: payslips and sensitive data from around 1.500 dpa employees. In the first announcements it was only guesswork, now it is a certainty. The Black Basta hack group carried out the cyber attack on the German Press Agency (dpa) and successfully stole data. As the mirror reports, the data is said to be the payslips of the employees with…

Read more

Risk Assessment: 5 Questions CISOs Should Ask
Risk Assessment: 5 Questions CISOs Should Ask

Cyber ​​attacks are now part of everyday life. The size and industry of the company hardly play a role anymore. However, how one is attacked and whether the attackers are successful in doing so is related to one's cybersecurity measures. Continuous risk assessment is important at this point. Not an easy task for the responsible Chief Information Officers (CISO) these days. According to the latest Allianz Risk Barometer, cyber incidents are currently the top business risk worldwide. Since IT forms the basis for almost all business processes today, its failure affects all areas of the company. This circumstance brings the one…

Read more

Uber hacked: access to internal systems and vulnerability reports stolen
B2B Cyber ​​Security ShortNews

Transportation service provider Uber suffered a cyberattack in which a suspected 18-year-old hacker downloaded vulnerability reports from HackerOne and shared screenshots of the company's internal systems, email dashboard and Slack server. The screenshots shared by the hacker appear to show full access to many of Uber's critical IT systems, including the company's security software and Windows domain. Uber attacker had full access The attacker also hacked the Uber Slack server, which he used to send messages to employees saying the company was hacked. However, screenshots from Uber's Slack show…

Read more