News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

F-Secure and WithSecure scan engines at medium risk
B2B Cyber ​​Security ShortNews

A slight but not entirely harmless vulnerability in several F-Secure products and the business version WithSecure allows attackers to crash the programs. F-Secure actually distributes the patches automatically. According to the portal heise.de, the products from F-Secure and the new business brand WithSecure have a vulnerability. Attackers could crash the scan engine in F-Secure products, preventing detection. WithSecure's product, the effects of an attack sound worse, since it should be possible to delete local data and bypass the protective measures. But one…

Read more

F-Secure Corporate Security becomes WithSecure
F Secure News

In recent years, F-Secure has transformed its corporate and consumer businesses into two strong divisions. The launch of WithSecure follows plans announced in February 2022 to split into two companies, both with increased customer focus and relevance and clear value propositions. WithSecure™ ushers in a new era for enterprise security products and solutions, while consumer security products and services remain available to both end users and partners through the existing F-Secure brand. WithSecure™ leverages the company's decades of proven security know-how, pragmatic research and instinctive technologies. This combination allows…

Read more

Log4j alarm: this is what F-Secure says about the security gap
Log4j Log4shell

A vulnerability in the Log4J library, which was discovered on Friday, December 10th, rocked software manufacturers and service providers around the world. The weak point in the standardized method for processing log messages in software from Microsoft's Minecraft to e-commerce platforms is already being attacked by attackers. It is almost impossible to describe the extent of the risk that currently exists in vulnerable applications. If a user-controlled string that targets the vulnerability is logged, the vulnerability can be run remotely. In simple terms, an attacker can use this vulnerability ...

Read more

F-Secure finds vulnerabilities in over 150 HP multifunction printers
F-Secure finds vulnerabilities in over 150 HP multifunction printers

F-Secure's security experts have found vulnerabilities in over 150 HP multifunction printers. HP is now releasing patches for security vulnerabilities that hackers can exploit to steal information or carry out other attacks on companies. HP Inc. has released patches for vulnerabilities that cybersecurity vendor F-Secure has discovered in over 150 of its multifunction printers (MFP). According to a study published by F-Secure, attackers can use the vulnerabilities to gain control of unprotected printers, steal information and infiltrate networks in such a way that further damage can be done. Vulnerabilities affect 150 HP printer models Two security advisors from ...

Read more

Every third suspicious email is also a threat
Every third suspicious email is also a threat

Around 33 percent of the e-mails reported as suspicious actually turn out to be a potential threat, as a study by F-Secure now shows. Phishing emails were the most common. For a study, F-Secure security experts analyzed more than 200.000 emails that were reported as suspicious by employees in companies around the world in the first half of 2021. They come to the conclusion that around one in three of these emails actually posed a potential threat. Most of the time it was phishing campaigns that extracted personal information from the victims ...

Read more

F-Secure Elements: the new security service platform 
F-Secure Elements: the new security service platform

Paradigm shift in cybersecurity: F-Secure introduces a modular security platform. The cloud-based platform F-Secure Elements gives companies fast, flexible and easy access to cybersecurity services. The cybersecurity provider F-Secure today presented the new cloud-based security platform F-Secure Elements: As Security-as-a-Service, it can be seamlessly integrated into any company environment and combines all the necessary security components that are available via a single cloud based management console can be administered. The company can choose those components that it really needs. F-Secure Elements is available as a subscription model from F-Secure's service partners and can either ...

Read more

20.5.21/XNUMX/XNUMX webinar: IoT security - this is how companies protect themselves
F Secure News

Attend F-Secure's free online seminar on "IoT security basics: How companies protect themselves" on May 20, 2021 from probably 10:00 to 10:30 a.m. The transparency in your own company network will also be endangered in 2021 by the use of Internet-of-Things (IoT) devices. Not knowing what the devices send back and what kind of influence an attacker can gain on the device - and therefore on the data - is still one of the biggest disadvantages of buying "smart" devices. Online seminar on May 20.05.21th, 10.00 at XNUMX:XNUMX a.m. If a secure…

Read more

Interviews: CISOs face challenges
Interviews: CISOs face challenges

CISOs face constant challenges to avoid drowning in "security debt." Overwhelmed security officers work every day to ensure that more and more security breaches do not result from increasing attacks. CISOs face an increasing 'security debt' to protect their organizations against the increasing number of attacks by well-equipped criminals. The criminal industry has an advantage in terms of speed and resources used. Still, CISOs and their departments can mitigate a growing number of attacks to prevent more breaches or compromises, according to a new report from cybersecurity provider F-Secure in…

Read more

Webinar 29.04.21/XNUMX/XNUMX: Preparing for a Serious Cyber ​​Attack 
F Secure News

F-Secure invites you to a free webinar on April 29.04.21th, 29: Preparing for a serious cyber attack and how to arm yourself. The old adage “prevention is better than cure” has never been more true than when it comes to cyber security and a cyber attack. Planning ahead to prepare for a cyberattack will save you both money and resources while helping to mitigate the potential threat of the attack itself. Webinar on April 10, 00:10 a.m. to 30:XNUMX a.m. In this webinar, our security expert Jan Kolloch will go over current techniques and capabilities of…

Read more

17.3.21 webinar: Exchange gap - I can do that
F Secure News

F-Secure invites you to the webinar: "Hafnium" vulnerability in Microsoft Exchange: Am I affected? What can I do? On March 17, 2021, 10:00-10:30 a.m. Recently, several attacks have been launched against Exchange Server using the exploit known as Hafnium. Although the underlying vulnerability was already known, and Microsoft published recommendations for it at the beginning of February and then patches for it at the beginning of March, the attack hit many companies, especially in Germany: Even if companies installed the patches promptly, the hackers were often faster and already had access the systems provided. On this occasion we want…

Read more