News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Remote maintenance software with SSL & TLS for more security
Remote maintenance software with SSL & TLS for more security

ProSoft announces a new version of its NetSupport Manager remote maintenance software with enhanced security features. Version 14 offers more flexibility and security through gateway encryption with SSL/TLS certificates. IT security expert and Trusted Advisor ProSoft presents the new major release v14 of NetSupport Manager - a high-speed solution for secure remote maintenance and remote control of servers, workstations and smart devices from the UK software developer of the same name. As a NetSupport Premier Partner, ProSoft offers training, support and consulting in addition to the software. "The cross-platform remote control software solution now includes a whole range of new and improved features to minimize support time...

Read more

Cyber ​​attack on wholesaler METRO
B2B Cyber ​​Security ShortNews

The management of METRO AG is currently confirming a partial failure of its IT infrastructure and thus also an already suspected cyber attack on the wholesaler. There are said to be offline systems for payment processing in the stores, since the cash register systems are also affected by the attack. There have been rumors for days that the immense IT disruptions at the wholesaler METRO were triggered by a cyber attack and are not a normal IT problem. METRO has now confirmed this general assumption with a statement on its website. Accordingly, all core systems are affected, which apparently affects all other systems,...

Read more

Post-quantum cryptography: encryption against quantum computers
Post-quantum cryptography: encryption against quantum computers

Algorithms used today for encryption may soon prove too weak - once quantum computers become practical. Algorithms and hardware must therefore be developed that can also withstand these powerful supercomputers: post-quantum cryptography. A few years ago, the US federal agency National Institute of Standards and Technology (NIST) initiated a process to define/evaluate quantum-resistant algorithms. The potential candidates were selected in various rounds. In total, more than 80 algorithms were proposed, some of which were dropped quite early. The reason for this was that mathematical attacks were developed for quantum computers that break the algorithms...

Read more

High security cloud service with universal app support
High security cloud service with universal app support

TeamDrive for iOS and Android with universal app support. The new version allows the use of any app with end-to-end encrypted collaboration via the high-security cloud service. With a new "universal version", the high-security cloud service TeamDrive can be used for the first time with any app on iPhones and iPads as well as mobile devices with Android. TeamDrive features seamless end-to-end encryption with a zero-knowledge architecture. This means that no one but the user himself has the access key to the data - not even the provider. This distinguishes TeamDrive from all US clouds whose operators are legally obliged to notify US authorities...

Read more

New ransomware tactic: partial encryption
New ransomware tactic: partial encryption

There is a new trend in ransomware: In order to be faster and avoid detection, attackers rely on partial (intermittent) encryption of the files. As the SentinelLabs blog reports, security functions can also be outwitted in this way. A new danger! SentinelOne experts are observing a new trend in the ransomware scene – intermittent encryption or partial encryption of victims' files. This encryption method helps ransomware operators bypass detection systems and encrypt victims' files faster. Instead of encrypting an entire file, the process only takes place for all…

Read more

Report: Growing threats from unencrypted devices
Report: Growing threats from unencrypted devices

Unencrypted devices can put any organization's security strategy at serious risk. This often-overlooked vulnerability allows attackers to penetrate the environment. A recent report by Absolute Software shows that 16 percent of endpoints are unencrypted, showing the problem is a bigger threat than one might think. A single vulnerable, lost, stolen, or compromised endpoint is enough to cause an incident. 16 percent unencrypted devices When an unencrypted device is connected to a corporate network in an office environment, the risk of a security incident is reduced. In the world of…

Read more

Desktop Firewall: Entry-Level Firewall UF-60 LTE
B2B Cyber ​​Security ShortNews

The German network infrastructure and security supplier LANCOM Systems rounds off its range of desktop firewalls. Like its sister model, the UF-60, the LANCOM R&S®Unified Firewall UF-60 LTE is the entry-level model in the portfolio. The special feature: With the additionally integrated LTE Advanced Modem, the UF-60 LTE can be operated as a backup for wired access or as a high-performance primary access with WAN uplink via LTE. It already offers cyber security with a top-class LTE modem for small companies, branch offices or home offices: from full Unified Threat Management (UTM) to the latest cyber security technologies such as sandboxing and machine learning. High level of security functions The…

Read more

REvil: Record of a gang of cyber extortionists
REvil: Record of a gang of cyber extortionists

REvil has been one of the most prolific ransomware-as-a-service campaigns in recent memory. Thousands of technology companies, managed service providers, and organizations from a wide variety of industries worldwide have been among their victims. Bitdefender draws the preliminary balance sheet of an extortion enterprise. The cooperation between security authorities and IT experts led to great success in the second half of 2021. Joint efforts were necessary because the cyber criminals also cooperated successfully. The experts at Bitdefender Labs take stock of the – perhaps only temporary – failure of a successful wave of ransomware-as-a-service. International strikes against REvil backers Most recently, international investigators struck heavy blows against the criminal REvil backers: In…

Read more

Chronology of a Midas ransomware attack

The problem of unused and forgotten tools - chronology of a Midas ransomware attack. The Sophos Rapid Response Team describes how cybercriminals proceeded in a real Midas attack case and how they moved in the network via commercial tools from October to December 2021 before finally launching the ransomware attack. With an integrated security ecosystem and Zero Trust, attackers would have had little chance of infiltrating the network and the attacked organization would have had greater control over unauthorized network access. Major attack with Midas ransomware After a ransomware attack on a technology provider in December 2021…

Read more

Simple email encryption with QUICK
B2B Cyber ​​Security ShortNews

Cryptshare receives patent for simple, encrypted communication. QUICK Technology, developed in Germany, has now been patented. The technology for e-mail encryption puts the focus on the user and at the same time ensures a high level of security. E-mail encryption is a major challenge for many, since solutions are usually too complicated for users. It is therefore the aim of Cryptshare AG to make secure communication as easy as possible for users. The German software manufacturer developed QUICK Technology for this purpose, which has now been patented in Germany (patent number 10 20 17 201 142). This technology eliminates the…

Read more