News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

How long do cyber attacks go unnoticed in the company?
How long do cyber attacks go unnoticed in the company? Photo by KeepCoding on Unsplash

A survey shows the fatal misconception about the duration between a cyber attack and recognizable effects: Many employees in Germany believe that the effects of a cyber attack become apparent within a week, for example through data encryption followed by a ransom demand. Cyber ​​criminals spy on company data, read communications and gain access to systems via employees or weak points. They usually act in secret for a long time and remain unnoticed for months. However, every second employee in Germany thinks that a cyber attack can be identified after a few days and that the duration from an attack to noticeable signs of a…

Read more

Ukraine conflict leads to decline in malicious Android apps
G Data News

As the G DATA Mobile Security Report shows: The Ukraine conflict is causing a decline in malicious Android apps. Still up to date: Smartphones with old Android versions remain a security risk for companies too. The number of malicious applications for Android devices fell significantly in the first half of the year: The experts at G DATA CyberDefense counted around 700.000 new apps with malicious code and thus 47,9 percent fewer in the first half of 2022 - compared to the first half of 2021. Smartphones with outdated Android versions that no longer receive security updates are still a problem. Significant decline in apps with malicious code The Ukraine conflict…

Read more

Dangerous: Every third employee solves IT problems without being asked
G Data News

In companies, younger people report their IT problems to the IT department less often than older people. This harbors dangers, as they fail to recognize a possible cyber attack and unintentionally become an attack helper. Despite a lack of specialist knowledge, employees try to solve IT problems themselves. Almost six percent of those surveyed admitted to solving IT problems or incidents despite a lack of knowledge. This was the result of the current survey “Cybersecurity in Numbers” by G DATA in cooperation with Statista and brand eins. Another four percent of those surveyed ignore a problem with the computer in a business environment. Even if it's annoying: the ...

Read more

Non-malware attacks are increasing
Non-malware attacks are increasing

G DATA threat report: attacks without malware are increasing. Cyber ​​criminals continue to attack companies more and more. The decline in attacks in 2021 is deceptive, as the number of attacks was extremely high in the 2020 pandemic. The current threat report from G DATA CyberDefense shows a significant decrease in the number of attack attempts averted in the first half of 2021 compared to the same period in the previous year. The reason for this is that attacks are no longer just used with malware. The risk for companies remains high. 40 percent decline according to statistics The number of cyberattacks averted has increased by more than 40 percent ...

Read more

Microsoft Exchange: Attackers scan for ProxyShell
G Data News

Attackers are currently targeting a number of vulnerabilities known as “ProxyShell”. The vulnerabilities have been closed since April and May. G Data recommends that companies affected patch their Exchange servers immediately. Around the BlackHat security conference, which takes place annually in Las Vegas, security researchers often publish previously unknown security gaps - this year too: three vulnerabilities in Microsoft Exchange are once again causing work in companies that operate an Exchange server locally. The names are: CVE-2021-34473 CVE-2021-34523 CVE-2021-31207 “The attacks by the Hafnium group on local Exchange servers in March of this year ...

Read more

Untrained employees increase IT risk 
Untrained employees increase IT risk

Untrained employees repeatedly put IT security to the test in German medium-sized companies. A G DATA survey sheds light on the problems and shows how effective security awareness is. Every second company in German medium-sized companies knows the situation if a cyber attack was successful. Untrained employees often play an important role in this. E-mails are the number one attack route in IT systems because employees can quickly fall for fake invoices or applications. A current survey by G DATA CyberDefense shows the pitfalls in security awareness. Employees are not IT security specialists IT security is for most employees ...

Read more

Saving IT with expertise
Saving IT with expertise

Incident response at Magnetbau Schramme: Save IT with expertise. Thanks to G DATA CyberDefense, Magnetbau Schramme was quickly back to work after a ransomware attack. A badly secured computer is enough for cyber criminals to smuggle ransomware into the company network and paralyze the IT infrastructure. Magnetbau Schramme also had to experience this. The incident response specialists from G DATA CyberDefense helped restore the systems and then improved IT security. No 100% security There is no such thing as XNUMX% IT security. Magnetbau Schramme also had to experience this. Thanks to good preparation and active help from G DATA CyberDefense, the ...

Read more

Exchange: New vulnerabilities discovered and closed
G Data News

In mid-April there were again some critical updates for Microsoft Exchange. As with hafnium, experts strongly advise installing the patches. Unlike with hafnium, however, the warning came from the American NSA. On patch day in mid-April, Microsoft closed two critical security holes that affect locally installed instances of Exchange 2013, 2016 and 2019. These security vulnerabilities allow arbitrary program code to be executed on an affected system. In contrast to the security vulnerabilities that the Hafnium group used, there are currently no signs, according to Microsoft, that the vulnerabilities are active ...

Read more

IceRat searches for passwords from online services
G Data News

The malicious program IceRat targets user passwords and illegal coin mining and relies on unusual strategies in order not to be discovered. The malware IceRat spies on the access data of users for various online services and can inadvertently increase users' electricity bills in the event of an infection - through covert illegal coin mining. Technically, the developers have come up with a number of things to prevent the malicious code from being recognized by security solutions. When looking for passwords, G DATA virus analyst Karsten Hahn took a closer look at IceRat. If the dangerous malware arrives at ...

Read more

Cyber ​​attacks doubled in Q3 / 2020

G DATA threat analysis: further doubling of cyber attacks in the third quarter. Attackers are still taking advantage of the corona pandemic to attack companies and private users. In the third quarter of the year, the cyber defense specialists from Bochum had to fend off almost twice as many cyber attacks as in the second quarter of 2020. With large campaigns, attackers attack both private computers and company networks. Particularly active: Malware such as Emotet, Agent Tesla, Gozi or RanumBot. The insecurity of people in the Corona crisis and the continued high number of employees working from home are causing cybercrime to boom. Q2 to Q3: Plus of 99,1 ...

Read more