News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Integrated Cloud Email Security for Microsoft 365
Integrated Cloud Email Security for Microsoft 365 - Image by Soandli on Pixabay

The Secure Email Gateway (SEG) is being enhanced with seamless integration into cloud platforms such as Microsoft 365. The API-based deployment option offers additional protection against phishing, malware, and zero-day attacks. The new API-based deployment model for securing email communication is the core of the expansion of the Retarus solution for cloud platforms such as Microsoft 365. With this approach, also known as Integrated Cloud Email Security (ICES), companies gain an additional option for effectively protecting their email infrastructure against threats such as phishing, malware, zero-day attacks, and Business Email Compromise (BEC) – without having to make changes to existing systems. The proven…

Read more

Email protection against complex cyber attacks
Email protection against complex cyber attacks

A cybersecurity company that provides comprehensive email protection against complex threats is introducing new developments. The updates include flexible deployment options and improved security features. The updates are designed to make it easier than ever for companies of all sizes and IT environments to defend themselves against increasingly sophisticated and modern cyberattacks with robust email security that is easy to purchase, implement and use. "Email remains the number one attack vector. Securing it has never been more urgent, especially as cybercriminals use AI to improve and scale their attacks. With ever more...

Read more

orchestration of email encryption
orchestration of email encryption

Email is an essential tool in a world of work that is becoming increasingly decentralized. But how can practicality, resilience and trust be combined? Encrypting data transmitted by email is essential to ensure the security of digital exchanges and to protect sensitive information, whether it is of a human, accounting or industrial nature. In addition, it is important that companies set up strict access management coupled with continuous monitoring of infrastructures to prevent intrusion attempts and quickly detect suspicious activity. When properly deployed, encryption becomes a…

Read more

DMARC Manager improves email security
DMARC Manager improves email security Image: Bing - AI

There is a new DMARC Manager: The advanced tool addresses the complex challenges that companies face in managing DMARC, DKIM and SPF configurations, especially when working with multiple domains. As email threats in the form of fraud and identity theft continue to increase, the need for robust email authentication procedures has never been greater. The DMARC Manager was developed by Hornetsecurity to provide administrators and Chief Information Security Officers (CISOs) with an intuitive solution to set up and maintain best practices in email authentication. Easier…

Read more

APT group TA397 attacks defense companies
B2B Cyber ​​Security ShortNews

Security experts have analyzed a new attack by the APT group TA397 - also known as "Bitter" - in more detail. As is often the case, it started with a special spear phishing email with an attachment. It contained a shortcut file and malicious PowerShell code. The attack was directed against an organization in the Turkish defense industry and took place in November 2024. The cybercrime group, which is known for espionage attacks in Europe and the Asia-Pacific region, used new attack methods that further developed its previous tactics, techniques and procedures (TTPs). In particular, the use of alternative data streams (ADS) within RAR archives is...

Read more

Content creation platforms abused for phishing attacks
B2B Cyber ​​Security ShortNews

Platforms that are often used by companies and graphic designers to collaborate and create content are being used by attackers for phishing attacks. This was discovered by threat analysts at Barracuda Networks. The corresponding content creation platforms have millions of users worldwide. Attackers use these platforms to send emails that contain legitimate-looking posts, designs and documents, but with embedded phishing links. When clicking on these links, users are redirected to fraudulent login pages or other misleading websites that aim to steal sensitive information such as login and other personal data. In one of the…

Read more

Manufacturing: Only 19 percent with email authentication 
Manufacturing: Only 19 percent with email authentication - Image by guilaine on Pixabay

Despite increasing cyberattacks, companies in the production and manufacturing sector do not have comprehensive protection against phishing and spoofing attacks. A survey shows that only 19 percent of manufacturing companies have implemented strict email authentication policies. A recent global study by email security provider EasyDMARC shows that while 61 percent of manufacturing companies have implemented the DMARC (Domain-based Message Authentication, Reporting, and Conformance) email authentication protocol, only 19 percent apply a strict authentication policy that offers comprehensive protection against phishing and spoofing attacks. Hardly any phishing and spoofing protection The study examined the 4.796 largest manufacturing companies worldwide and shows that 43…

Read more

Major phishing campaigns against European companies
B2B Cyber ​​Security ShortNews

Companies in three countries were exposed to phishing attacks in May 2024: As the team led by ESET researcher Jakub Kaloc found, attackers tried to spread various malware for information theft (infostealers) via email. Small and medium-sized companies in Poland were particularly affected. The attackers used previously compromised email accounts and company servers not only to spread malicious emails, but also to host malware and collect stolen data. "In total, we registered nine phishing campaigns, seven of which targeted Poland in May," explains ESET researcher Jakub Kaloc, who analyzed the phishing campaigns....

Read more

Microsoft sends customers warning email that looks like spam
B2B Cyber ​​Security ShortNews

After the attack by Midnight Blizzard in January, Microsoft warned its customers in June by sending an explanatory email. It's just unfortunate that such an important message ends up in spam, as Microsoft apparently sent it without email authentication such as SPF or DKIM. Security experts are raising the alarm in many channels. Microsoft was attacked by Midnight Blizzard on January 12, 2024. The Russian-sponsored actors apparently had access to email accounts of high-ranking employees. However, the attackers are said to have had no access to the customer environments. Microsoft had dealt with the attack and informed many customers in June...

Read more

Spearphishing from North Korea
B2B Cyber ​​Security ShortNews

The US government warns of threat actors from North Korea. As a result, they use weak email DMARC (Domain-based Message Authentication Reporting and Conformance) settings to send fake spearphishing emails as if they came from a legitimate email address. “We have observed that North Korean threat actors like APT43 are exploiting the flawed DMARC configurations to easily spoof well-known institutions at major universities, think tanks and NGOs. This allowed them to target prominent facilities in specific areas and collect high-priority intelligence for the North Korean regime. They did this by stealing the email addresses of legitimate users from legitimate…

Read more