News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cryptocurrency industry on fire
north korea hacker

F-Secure reports: North Korean hackers launch global attack campaign on the cryptocurrency industry. Although the professional attackers covered their tracks, F-Secure was able to reconstruct a global attack by the so-called Lazarus Group. The cybersecurity specialists at F-Secure have published a report in which they link details of a targeted attack on a company in the cryptocurrency industry with the Lazarus Group. The group of hackers, which is believed to have close ties to the Democratic People's Republic of Korea (DPRK), is known for its highly professional approach, which pursues purely financial interests. In the report, F-Secure comes from the combination of ...

Read more

Hackers target research on Covid-19
F Secure News

As government agencies in the USA, Canada and Great Britain announced, the Russian hacker group APT29 or The Dukes, as they are called in some circles, has targeted organizations that are researching vaccines against the coronavirus. Speaking to Bloomberg, Artturi Lehtiö, director of strategy and business development at F-Secure and lead researcher on a 2015 analysis of the group's activities, said these types of organizations were not traditional targets for The Dukes. However, he also stresses that in keeping with The Dukes' alignment with national security interests, the attacks ...

Read more

Guide to cybersecurity in the Corona crisis
News B2B Cyber ​​Security

F-Secure has put together a comprehensive cybersecurity guide for the COVID-19 outbreak to help businesses secure operations during the pandemic. The coronavirus pandemic is forcing companies to change the way they work. Offices around the world are closing their doors and instructing their employees to work from home. With the rapid spread of COVID-19, some companies made drastic changes practically overnight. That is hardly enough for the IT departments to make the transition smooth and secure. There is also not enough time to develop the threat models ...

Read more