News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Test: Endpoint Protection for MacOS Ventura
AV TEST News

For more protection under MacOS Ventura, the independent test laboratory AV-TEST tested 5 solutions for corporate networks and 9 protection packages for individual users. While many products shine, a few others have some difficulties. Only recently there were reports that MacOS was becoming more of a focus for cybercriminals. In addition to new malware droppers, it was revealed that the APT group LockBit has adopted the attack code from the notorious ransomware groups BlackMatter and DarkSide to target macOS systems. Corporate protection for MacOS Ventura For the best possible protection of MacOS systems with Ventura, the AV-TEST laboratory has...

Read more

Win11 test: Endpoints against data stealer and ransomware

In their "Advanced Threat Protection" series, the antivirus experts from AV-TEST examined 15 endpoint solutions for companies in 10 scenarios under Windows 11 to protect against current data stealer and ransomware techniques. Enterprise workstation protection solutions require the best protection against the latest attack techniques. The AV-TEST laboratory examined 15 protection products under Windows 11 to see whether they also recognized and defended against the new "Inline Execute Assembly" attack technique used by data stealers and ransomware. The Advanced Threat Protection test provides clear information about which products protect well against the latest threats - and which do not. Additionally…

Read more

Enterprise browser with employee identity protection 
Enterprise browser with employee identity protection

The new CyberArk Secure Browser is the first of its kind. With its flexible, identity-based approach to employee and third-party access to company resources, it helps companies to better protect themselves from attacks. By 2030, enterprise browsers will be the core platform for delivering productivity and security software to managed and unmanaged devices because they enable frictionless hybrid ways of working. Browsers provide the critical link between identities, applications, and data, but this also makes them a popular target for cybercriminals — especially in distributed environments where employees of…

Read more

Security test: 16 endpoint solutions 
B2B Cyber ​​Security ShortNews

AV-Comparatives has released the Business Main Test Series fact sheet for March and April. In the security test, 16 business protection solutions were examined and evaluated. A few products are not performing as well as might be expected. The results of the Real-World Protection Test and the Malware Protection Test provide important insights into the performance of these security products. The Real-World Protection Test measured each product's ability to protect against malicious URLs. For this purpose, 262 test cases were carried out from the beginning of March to the end of April. The Malware Protection Test evaluates the ability of any security program to protect a system...

Read more

Windows 11: Endpoint Security in the test
Windows 11: Endpoint Security in the test

Since Windows 11 is increasingly becoming the standard system in companies as well, the AV-TEST laboratory tested 17 solutions for endpoints in companies and an additional 16 products for individual workstations or home office notebooks. The results show small surprises, but no disaster. In companies, malware such as Trojans, ransomware or data stealers always attack the weakest point: the end point with employees who usually have other high skills than cybersecurity, for example. Since companies are increasingly relying on new PCs and thus also Windows 11, the AV-TEST laboratory has 17 endpoint solutions...

Read more

Endpoint security: defense against the latest ransomware
Endpoint security: defense against the latest ransomware

APT groups use many different attack tactics. AV-TEST attacked protection products for companies in 10 currently used scenarios with the techniques ".Net Reflective Assembly loading", ".Net Dynamic P/Invoke" and "AMSI Bypass". Only half of the products examined were able to withstand 100 percent of all attacks. The Advanced Threat Protection tests are specific, but they repeatedly test protection software against the latest attack techniques from the APT groups. Such as ".Net Reflective Assembly loading", a technique used in its basic form in attacks by Cobalt Strike, Cuba or Lazarus. But also the techniques ".Net Dynamic...

Read more

Mobile device management also for SMEs
B2B Cyber ​​Security ShortNews

The security provider G DATA has completely overhauled its mobile device management and thus also ensures more security for smartphones. The field of mobile security in the network is now also available for SMEs - an area that is usually less well protected. G DATA CyberDefense has fundamentally revised its mobile device management (MDM) solution. With the update, even small companies with five smartphones can now securely manage their devices in the company network with the stand-alone solution, regardless of the endpoint protection chosen. MDM for SMEs with as few as 5 smartphones The MDM solution is available for both Android mobile devices and…

Read more

Identity Security for Zero Trust
Identity Security for Zero Trust

While the majority of organizations understand the importance of identity security, only 9 percent are taking an agile, holistic, and mature approach to protecting identities in their hybrid and multi-cloud environments. That's according to a new study by CyberArk. This also provides a maturity model that helps security leaders assess their current strategies, uncover risks and strengthen cyber resilience. For the report, The Holistic Identity Security Maturity Model: Raising the Bar for Cyber ​​Resilience,1 CyberArk and the Enterprise Strategy Group (ESG) surveyed 1.500 security professionals worldwide, including…

Read more

Better defense against cyber threats at the endpoint
Better defense against cyber threats at the endpoint

With many advancements to its endpoint security portfolio, such as Adaptive Active Adversary Protection, Linux malware protection enhancements, health check capabilities, built-in ZTNA agent and more, Sophos improves its defense against cyber threats. Sophos is introducing several enhancements to its endpoint security portfolio to improve protection against advanced cyber threats and streamline endpoint security management. These include new Adaptive Active Adversary Protection, improvements in protection against Linux malware, account health check functions and an integrated Zero Trust Network Access (ZTNA) agent for Windows and macOS devices. Ransomware remains the #1 threat “Ransomware remains one of the most prevalent…

Read more

Cyber ​​attacks in the education sector
B2B Cyber ​​Security ShortNews

It is evident that the education sector is vulnerable to cyberattacks due to the amount of personal data available across user devices and corporate networks. For example, just last fall, in the US, the FBI, CISA, and MS-ISAC issued a warning against the Vice Society, a group known for disproportionately targeting the education sector with ransomware attacks. Attacks on universities and similar institutions in particular have increased significantly in Europe in recent months. Tight budgets and resources “While cybersecurity in education is undoubtedly an important…

Read more