News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hardware encrypted for compliance and security
Hardware encrypted for compliance and security

A specialist in hardware encrypted USB drives introduces the latest generation of the Sentry product line. The Sentry 5 series storage solutions comply with the new FIPS-140-3 Level 3 profile, a further development of the US security certification FIPS 140-2, which is also known in Europe. The requirements for physical security against manipulation and identity-based authentication have been increased again. For example, important security parameters are constantly checked during operation. Sentry 5 is already listed on the “Modules in Process List” of the US National Institute of Standards and Technology (NIST). Final certification is expected shortly (https://csrc.nist.gov/Projects/cryptographic-module-validation-program/modules-in-process/Modules-In-Process-List). Hardware-based…

Read more

Myths about data encryption
Myths about data encryption

Data encryption is slow, complex, resource-consuming and inconvenient in everyday life. These and other prejudices against data encryption do not correspond to the facts. The need to protect data for legal and compliance reasons is an accepted fact in the business world. Data protection officers and business strategists are aware that this necessity is becoming even more important not only in international business, but also due to distributed working environments and the rapidly increasing use of the cloud in all business areas. The most effective technology to address compliance requirements and cyber risks is to encrypt all sensitive data that the company sends towards...

Read more

Vulnerability in KYBER endangers post-quantum cryptography
B2B Cyber ​​Security ShortNews

KYBER, which is supposed to serve as the basis for post-quantum cryptography, probably still has vulnerabilities. Researchers have found a vulnerability in software libraries that can be circumvented using a timing-based attack. The National Security Agency (NSA), Facebook and Google are already relying on this. The KYBER key encapsulation method (KEM) was developed to replace classical encryption against cryptanalytic attacks using powerful quantum computers. It was developed by a team of developers from Europe and North America and is licensed under the Apache License 2.0. Vulnerability discovered in KYBER Researchers have discovered a vulnerability and are working on developing an attack...

Read more

Researchers hack encrypted Bluetooth connections
B2B Cyber ​​Security ShortNews

Researchers at Eurecom University in the south of France have discovered Bluetooth vulnerabilities and developed attacks for them. The so-called “BLUFFS” can be used to break into Bluetooth sessions, spoof the device identity and carry out man-in-the-middle attacks. The “BLUFFS” attacks by Eurecom researchers are tough: they rely on vulnerabilities in the structure of Bluetooth. Daniele Antonioli, Assistant Professor at Eurecom University, has discovered the possibilities for Bluetooth attacks that exploit previously unknown vulnerabilities in the Bluetooth standard. The vulnerabilities relate to how session keys are derived to decrypt data in exchange. Weak points in the Bluetooth architecture The defects found…

Read more

Secure data in production
Secure data in production

IT and OT are merging more and more, with the effect that production environments can also be directly affected by cyber attacks. A particularly drastic example occurred last year when hackers paralyzed Toyota's entire production facility. Nils Gerhardt, Chief Technology Officer, from Utimaco shows five principles that companies should observe in order to secure their production in the best possible way. Encrypt sensitive data Software-based data and folder encryption ensures that, if in doubt, criminals cannot do anything with stolen data. This means that trade secrets are protected even if a company falls victim to a hacker attack. Effective…

Read more

Analysis: This is how an attack by the Akira ransomware group works

South Westphalia's IT was attacked by the hacker group "Akira", which has meant that numerous local governments have only been able to work to a limited extent for weeks. The ransomware group encrypted server data and is now demanding a significant ransom, which is not paid. Akira, a new type of ransomware, only appeared in the spring. But who is actually behind the group? Trend Micro analyzes the background, techniques and tactics of this highly targeted successful group. “Our analysis shows that the ransomware uses similar routines to Conti, such as obfuscating strings and encrypting files. It also avoids the same file extensions as...

Read more

Ransomware: 60 percent of companies are extremely concerned

The new ransomware survey shows: Awareness of ransomware in companies is high. However, prevention is still not a top priority in almost half of companies. One in five respondents said their company would be affected by a cyberattack in 2023. Nearly 60% of organizations are very or extremely concerned about ransomware attacks, according to a recent survey by leading cybersecurity provider Hornetsecurity. Hornetsecurity's annual ransomware survey shows that more than nine in ten companies (92,5%) are aware of the potential negative impact of ransomware. However...

Read more

NIS2 requires new tools
B2B Cyber ​​Security ShortNews

The Network and Information Security Directive 2 (NIS2) will affect thousands of companies within Germany by the end of 2024. In view of increasing cyber threats, the European Commission wants to increase the level of cybersecurity in Europe with NIS2. Valentin Boussin, Country Manager Germany for the French secure conferencing specialist Tixeo, explains what impact this directive has on the video communication of affected companies. Companies subject to NIS2 will in future be obliged to use technical measures to protect their video and text communications from cyberattacks. Companies in highly critical sectors still have to use video conferencing solutions approved by the respective national security authority…

Read more

Anti-ransomware: real-time detection against data encryption
Anti-ransomware: real-time detection against data encryption - photo by rishi on Unsplash

New detection, alerting, and air-gapped resiliency capabilities give users better protection against ransomware attacks in hybrid clouds. Zerto Announces Real-Time Detection Against Data Encryption and Launches New Cyber ​​Resilience Vault. Zerto, a Hewlett Packard Enterprise company, introduces a new method for real-time detection of encrypted data and an air gapped recovery vault. With real-time detection, organizations can identify early signs of data encryption, enabling early detection and mitigation of a potential ransomware attack. At the same time, Zerto is introducing the physical appliance "Zerto Cyber ​​Resilience Vault" for the first time, which further improves the protection of data...

Read more

Despite ransomware ransom: Only 24 percent receive all data 
Despite ransomware ransom: Only 24 percent receive all data

As a study shows, despite paying a ransom, only 24 percent of German companies are able to recover all their data after a ransomware attack. The majority of businesses struggle with backup and recovery solutions. 91 percent of German IT and cybersecurity leaders are concerned that their company might not be able to maintain business continuity after a cyber attack. That's according to the second report from Rubrik Zero Labs, the research arm of Zero Trust Data Security™ company Rubrik. The issue, entitled The Hard Truths of Data Security, provides an insight into the challenges...

Read more