News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Easypark falls victim to a cyber attack and loses data
B2B Cyber ​​Security ShortNews

As the parking service provider Easypark recently announced, the company was the victim of a cyber attack on December 10th. Easypark states that data was lost, but that it was not sensitive. Users must check for themselves whether they are affected by the data loss at Easypark. The company Easypark informs its customers that the company was hit by a cyber attack on December 10th. Easypark informs on its homepage that only insensitive data was stolen in the attack. The unauthorized access is said to have been noticed immediately and further access is reported...

Read more

New danger: hacking of electric vehicles
B2B Cyber ​​Security ShortNews

More and more people are choosing electric cars, be it for reasons of innovation or for environmental reasons. But the ecological and technological advantages of electric vehicles come with new risks. According to the Global Automotive Cybersecurity Report, threats against application programming interfaces (APIs) increased by up to 2022 percent by 380, accounting for 12 percent of all incidents. This also applies to the system design of electric cars. The safety of the drivers and the data that the vehicles generate are at stake. Like the perpetrators, the industry must act quickly...

Read more

Cyber ​​attack on Continental - what is happening now
Cyber ​​attack on Continental - what is happening now

For a long time there was no statement from Continental on the cyber attack, the theft of 40 TB of data and the ransom demand of first 50 and then 40 million dollars. Continental is now clarifying what happened and how to react. The actual attack on Continental probably took place in August 2022. At that time, Continental announced that everything was fine. It was announced that the attack had been noticed and warded off. But far from it: the hackers were probably still on the Continental network at the time or still had access. In daily operation...

Read more

Lapsus$ is probably behind Uber-Hack
Lapsus$ is probably behind Uber-Hack

A few days ago, there was news that Uber was the victim of a major hack. There are even suspicions that the attackers have captured a vulnerability list from a bug bounty program. Uber, the travel service provider, has now confirmed that the attacker is the Lapsus$ group. Much was still unclear in the first report on the Uber hack. According to the driving service provider Uber, the processes can now be described and precisely defined which data was stolen. Here's what happened, according to Uber: “An Uber EXT contractor's account was compromised by an attacker using malware and their credentials were stolen. It…

Read more

Data theft: Hacker attack on T-Mobile US
B2B Cyber ​​Security ShortNews

The Telekom subsidiary T-Mobile US was attacked by hackers and had to admit that data was stolen. It is still unclear which and how much data was stolen. According to media reports, millions of T-Mobile US customers could be affected. A report from the Tagesschau. According to Tagesschau, T-Mobile US, a subsidiary of Deutsche Telekom, has confirmed the hacker attack on your data. However, the mobile communications provider said that attackers had only gained access to some customer data. At the moment, you still have to get a more detailed overview of the attack and its dimensions. The company showed itself ...

Read more

Cyber ​​criminals use cloud logs
Cloud security cloud logs

Cyber ​​criminals use cloud technology to accelerate attacks on businesses. Trend Micro Research finds terabytes of stolen data for sale in cloud logs. Trend Micro has identified a new breed of cybercrime. Criminals use cloud services and technologies to accelerate attacks. Companies therefore have less time to identify and react to a loss of data. Trend Micro researchers found terabytes of internal business data of companies as well as logins for popular providers such as Amazon, Google, Twitter, Facebook and PayPal, which are offered for sale on the dark web. The data is saved by accessing the cloud logs ...

Read more

Malicious Chrome extensions lead to data theft
Trend Micro News

Google Chrome Extensions and Communigal Communication Ltd. (Galcomm) domains have been exploited in a campaign that aims to track users' activities and data. In the past three months, Awake Security had found 111 malicious or fake Chrome Extensions using Galcomm domains as Command & Control (C&C) infrastructure. There have been at least 32 million downloads of these malicious extensions. The campaign used nearly 15.160 Galcomm registered domains to host malware and browser-based monitoring tools. That is almost 60% of the domains that can be reached with this registrar. Galcomm affirms that it is not involved. The attacks successfully avoided ...

Read more