News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware attacks: via remote device into the network
Ransomware attacks: via remote device into the network - AI

Successful ransomware groups are increasingly switching to remote encryption, according to Sophos' latest CryptoGuard report. The problem: traditional anti-ransomware protection does not “see” the disaster coming and is ineffective. The type of attack has increased by 62 percent. Sophos has published its new report “CryptoGuard: An Asymmetric Approach to the Ransomware Battle” with the evaluations of its CryptoGuard defense technology. The most successful and active ransomware groups such as Akira, ALPHV/BlackCat, LockBit, Royal or Black Basta are consciously switching to remote encryption for their attacks. With this so-called “remote ransomware”, cybercriminals use a compromised and often poorly protected device to steal data on other…

Read more

Integrated Cloud Risk Management and XDR 
Integrated Cloud Risk Management and XDR

Trend Micro is expanding its protection by expanding its cybersecurity platform to include Cloud Risk Management and XDR. With this, companies can consolidate their cybersecurity landscape and gain a complete overview of cloud security risks in hybrid IT environments. Although resilient security requires an understanding of the risks across all systems and applications that form the attack surface, only 9 percent of organizations actively monitor them. Digital transformation and cloud migration have significantly increased the attack surface of organizations. As a result, enterprises and governments have adopted isolated security technologies for on-premises and multi-cloud environments, including AWS, Azure, GCP,…

Read more

Test: Endpoint solutions under Windows 11
AV TEST News

In September and October 2023, the AV-TEST Institute tested a total of 17 security solutions for companies and 17 packages for individual workstations under Windows 11 for their protective effect, system load and usability. Some products cannot withstand all attacks in the test. The experts at AV-TEST examined 17 security solutions for companies in the laboratory. It was tested to see how well they stand up to malware. Each individual program had to fend off nearly 20.000 real malware attacks, taking into account all protection features such as URL/web filtering, behavior-based detection and heuristics in the test against zero-day threats and common malware. In the counter-check, over…

Read more

AMTD: Pioneering modern IT security
AMTD: Pioneering modern IT security

Automated Moving Target Defense (AMTD) improves application security at Sophos Endpoint by creating threat-agnostic barriers for every process. It becomes more difficult for software to execute code that is not an original part of the application. This particularly prevents malware from executing. As cyber threats intensify, security teams are dealing with an increasing number of alerts and false positives. This affects security efficiency and ties up a lot of resources. Automated Moving Target Defense (AMTD), a new concept developed and promoted by Gartner, aims to break this dynamic and provide relief. Security products…

Read more

Test: 33 protection solutions against data stealers and ransomware
AV TEST News

The independent test laboratory AV-TEST tested 33 protection solutions in defense tests against data stealers and ransomware. The products for companies and individual workstations consistently demonstrate strong defense performance against specific threats. The list of attacked companies, universities, colleges or institutions such as hospitals and administrations in the media is getting longer and longer. Classic protection products or company solutions must combine all of their protection technologies to defend against cyber attacks. The Advanced Threat Protection test shows how well they do this in 10 real attack scenarios. In the current test, the protection solutions have to defend the Windows systems against data stealers and ransomware...

Read more

Zero-trust remote access solution for secure hybrid working
Zero-trust remote access solution for secure hybrid working - image by Franz Bachinger on Pixabay

The new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting modern hybrid working from anywhere and at any time. Through complete integration into the LANCOM Management Cloud, commissioning and configuration are “zero-touch” for easy and quick rollout of new remote access connections. The LANCOM Trusted Access solution dynamically adapts to increasing security requirements. Zero trust from SMEs to enterprises LANCOM Trusted Access supports both classic full network access as a VPN client as well as the migration to a zero trust security architecture with...

Read more

Report 2023: Ransomware dominance
Report 2023: Ransomware dominance

The increase in ransomware, COTS malware, and attacks on cloud providers brings new challenges for cybersecurity teams. The Elastic Global Threat Report 2023 clearly shows the dominance of ransomware among all malware. The Elastic Security Labs Global Threat Report is based on analysis of over 1 billion data points from the last twelve months. It shows that ransomware is still on the rise and becoming increasingly diversified: More than half of all malware infections observed took place on Linux systems and credential access procedures for intrusions into cloud systems are now standard. In summary the…

Read more

Zero Trust: Endpoint agents as a VPN replacement
Endpoint agents as a virtual private network replacement - Image by Gerd Altmann on Pixabay

Organizations can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. New endpoint agents for macOS and Windows serve as a complete replacement for traditional virtual private networks. Lookout has announced new Windows and macOS endpoint agents for its Lookout Secure Private Access Zero Trust Network Access (ZTNA) solution, facilitating the complete replacement of overburdened virtual private networks (VPNs) with cloud-based security. Enterprises can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. According to analysts at Gartner, by…

Read more

17 endpoint solutions for Windows 10 Pro tested
Testing 17 Endpoint Solutions for Windows 10 Pro - Image by Pete Linforth from Pixabay

After about a year at the latest, even laypeople know what a cyber war means and what collateral damage it can cause to completely uninvolved companies. The AV-TEST laboratory tested and evaluated the performance of 17 endpoint products. For the best protection of company and employee PCs with Windows, the AV-TEST specialists tested 17 protection products in the laboratory. The results show that the market offers very good security solutions for companies. However, individual products cannot quite keep up. War in Ukraine: Collateral damage to companies Last year there was always bad news about…

Read more

Test: Endpoint Protection for MacOS Ventura
AV TEST News

For more protection under MacOS Ventura, the independent test laboratory AV-TEST tested 5 solutions for corporate networks and 9 protection packages for individual users. While many products shine, a few others have some difficulties. Only recently there were reports that MacOS was becoming more of a focus for cybercriminals. In addition to new malware droppers, it was revealed that the APT group LockBit has adopted the attack code from the notorious ransomware groups BlackMatter and DarkSide to target macOS systems. Corporate protection for MacOS Ventura For the best possible protection of MacOS systems with Ventura, the AV-TEST laboratory has...

Read more