News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Myths about data encryption
Myths about data encryption

Data encryption is slow, complex, resource-consuming and inconvenient in everyday life. These and other prejudices against data encryption do not correspond to the facts. The need to protect data for legal and compliance reasons is an accepted fact in the business world. Data protection officers and business strategists are aware that this necessity is becoming even more important not only in international business, but also due to distributed working environments and the rapidly increasing use of the cloud in all business areas. The most effective technology to address compliance requirements and cyber risks is to encrypt all sensitive data that the company sends towards...

Read more

Vulnerability in KYBER endangers post-quantum cryptography
B2B Cyber ​​Security ShortNews

KYBER, which is supposed to serve as the basis for post-quantum cryptography, probably still has vulnerabilities. Researchers have found a vulnerability in software libraries that can be circumvented using a timing-based attack. The National Security Agency (NSA), Facebook and Google are already relying on this. The KYBER key encapsulation method (KEM) was developed to replace classical encryption against cryptanalytic attacks using powerful quantum computers. It was developed by a team of developers from Europe and North America and is licensed under the Apache License 2.0. Vulnerability discovered in KYBER Researchers have discovered a vulnerability and are working on developing an attack...

Read more

Researchers hack encrypted Bluetooth connections
B2B Cyber ​​Security ShortNews

Researchers at Eurecom University in the south of France have discovered Bluetooth vulnerabilities and developed attacks for them. The so-called “BLUFFS” can be used to break into Bluetooth sessions, spoof the device identity and carry out man-in-the-middle attacks. The “BLUFFS” attacks by Eurecom researchers are tough: they rely on vulnerabilities in the structure of Bluetooth. Daniele Antonioli, Assistant Professor at Eurecom University, has discovered the possibilities for Bluetooth attacks that exploit previously unknown vulnerabilities in the Bluetooth standard. The vulnerabilities relate to how session keys are derived to decrypt data in exchange. Weak points in the Bluetooth architecture The defects found…

Read more

Secure data in production
Secure data in production

IT and OT are merging more and more, with the effect that production environments can also be directly affected by cyber attacks. A particularly drastic example occurred last year when hackers paralyzed Toyota's entire production facility. Nils Gerhardt, Chief Technology Officer, from Utimaco shows five principles that companies should observe in order to secure their production in the best possible way. Encrypt sensitive data Software-based data and folder encryption ensures that, if in doubt, criminals cannot do anything with stolen data. This means that trade secrets are protected even if a company falls victim to a hacker attack. Effective…

Read more

Analysis: This is how an attack by the Akira ransomware group works

South Westphalia's IT was attacked by the hacker group "Akira", which has meant that numerous local governments have only been able to work to a limited extent for weeks. The ransomware group encrypted server data and is now demanding a significant ransom, which is not paid. Akira, a new type of ransomware, only appeared in the spring. But who is actually behind the group? Trend Micro analyzes the background, techniques and tactics of this highly targeted successful group. “Our analysis shows that the ransomware uses similar routines to Conti, such as obfuscating strings and encrypting files. It also avoids the same file extensions as...

Read more

Ransomware: 60 percent of companies are extremely concerned

The new ransomware survey shows: Awareness of ransomware in companies is high. However, prevention is still not a top priority in almost half of companies. One in five respondents said their company would be affected by a cyberattack in 2023. Nearly 60% of organizations are very or extremely concerned about ransomware attacks, according to a recent survey by leading cybersecurity provider Hornetsecurity. Hornetsecurity's annual ransomware survey shows that more than nine in ten companies (92,5%) are aware of the potential negative impact of ransomware. However...

Read more

NIS2 requires new tools
B2B Cyber ​​Security ShortNews

The Network and Information Security Directive 2 (NIS2) will affect thousands of companies within Germany by the end of 2024. In view of increasing cyber threats, the European Commission wants to increase the level of cybersecurity in Europe with NIS2. Valentin Boussin, Country Manager Germany for the French secure conferencing specialist Tixeo, explains what impact this directive has on the video communication of affected companies. Companies subject to NIS2 will in future be obliged to use technical measures to protect their video and text communications from cyberattacks. Companies in highly critical sectors still have to use video conferencing solutions approved by the respective national security authority…

Read more

Anti-ransomware: real-time detection against data encryption
Anti-ransomware: real-time detection against data encryption - photo by rishi on Unsplash

New detection, alerting, and air-gapped resiliency capabilities give users better protection against ransomware attacks in hybrid clouds. Zerto Announces Real-Time Detection Against Data Encryption and Launches New Cyber ​​Resilience Vault. Zerto, a Hewlett Packard Enterprise company, introduces a new method for real-time detection of encrypted data and an air gapped recovery vault. With real-time detection, organizations can identify early signs of data encryption, enabling early detection and mitigation of a potential ransomware attack. At the same time, Zerto is introducing the physical appliance "Zerto Cyber ​​Resilience Vault" for the first time, which further improves the protection of data...

Read more

Despite ransomware ransom: Only 24 percent receive all data 
Despite ransomware ransom: Only 24 percent receive all data

As a study shows, despite paying a ransom, only 24 percent of German companies are able to recover all their data after a ransomware attack. The majority of businesses struggle with backup and recovery solutions. 91 percent of German IT and cybersecurity leaders are concerned that their company might not be able to maintain business continuity after a cyber attack. That's according to the second report from Rubrik Zero Labs, the research arm of Zero Trust Data Security™ company Rubrik. The issue, entitled The Hard Truths of Data Security, provides an insight into the challenges...

Read more

Teamdrive with new version
Teamdrive with new version

The new version 5 of the cloud application TeamDrive is available for download. According to the manufacturer, TeamDrive 5 has over 50 new and improved functions. The most important innovations are: Introduction of a new group management for large teams, numerous functions to increase productivity, simplification of workflows in the company, a modernized user interface and a security concept that has been reinforced again. User feedback Most of the new and expanded functions are based on user feedback, emphasizes TeamDrive Managing Director Detlef Schmuck. He says: "Our product, technical and sales teams have listened carefully to our customers in order to improve the overall experience when using TeamDrive...

Read more