News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Employee test with phishing simulation
Spam phishing simulator

With the G DATA phishing simulation, employees can be made aware of dangerous emails. Phishing emails such as fake applications or invoices are still one of the greatest threats to IT security. Attackers consistently exploit human behavior to copy critical data or infiltrate networks. So that companies can measure the IT security status of their employees, G DATA CyberDefense is now expanding its current security awareness training to include a phishing simulation. G DATA CyberDefense is now providing a phishing simulation. With this, companies can sensitize their employees to dangerous phishing emails ...

Read more

G DATA Business Generation 15
Cyber ​​Security News

G DATA Business Generation 15: Maximum protection for companies in a new design. The German cyber defense provider is launching a new B2B solution portfolio with a revised guard G DATA CyberDefense has revised its business solutions and once again increased the protective effect: thanks to a new guard with AMSI connection, IT managers in companies benefit from more than just one outstanding protection against cyber attacks, but also from improved performance and fewer false positives. Administrators also benefit from a completely redesigned user interface. This offers an even better overview of the individual components and the network security status and enables intuitive ...

Read more

Outdated XP systems are an incalculable risk
G Data News

Windows XP systems: Outdated systems are an incalculable risk for medium-sized businesses. Many medium-sized companies still use computers with the outdated operating system. In the manufacturing industry in particular, many control computers only run under Windows XP or other outdated operating systems. This makes it easy for cyber criminals to attack. The computers should be removed from the network as quickly as possible or at least effectively separated. Otherwise there is a risk of damage from attacks that can quickly threaten the very existence of the company. Critical systems still run with Windows XP In many companies, these ancient computers are active all year round. Critical systems are running ...

Read more

Cyber ​​attacks increase by 154 percent
Cyber ​​attack access data

The current threat analysis by G DATA CyberDefense shows: Cyber ​​criminals also massively attacked private users and companies in the second quarter. The number of cyber attacks increased by 154 percent in the second quarter. In May alone, G Data registered more than twice as many attacks as in April. "Cyber ​​criminals continue to benefit from the Corona crisis and have made significantly more attempted attacks since the outbreak of the pandemic," says Tim Berghoff, Security Evangelist at G DATA CyberDefense. “Even though many employees have now returned from their home office to their office workstation, people spend a lot more time privately on ...

Read more

Corona spam campaign
G Data News

G Data warns of an active spam campaign: Alleged corona health and safety rules contain malware. Criminals are currently sending a document with allegedly changed corona occupational safety rules. The mail is disguised as information from the Ministry of Health. An email allegedly from the Federal Ministry of Health contains a downloader for malware. The file attachment with the name "Bund-Arbeitsschutzregel-Corona-September.zip" allegedly contains a document with updated and now binding rules for infection protection at the workplace. The text of the mail allows the conclusion that companies are primarily the target group. For this reason, companies need to be particularly careful at the moment when alleged ...

Read more

Java malware copies passwords
G Data News

G Data researchers reveal: Java malware copies passwords and also enables remote control via RDP. A newly discovered malware developed in Java can copy access data, remotely control the victim's computer and execute other commands. The integrated ransomware component is not yet fully functional. G DATA CyberDefense analysts warn of new malware developed in Java. If the malware is active on a system, criminals can read passwords from browsers and the e-mail program. Since the malware has a remote access function (RAT), an attacker can also remotely ...

Read more