News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

IT security: NIS-2 makes it a top priority
IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. This is especially the case in smaller companies. The larger the company, the less often the bosses feel responsible. Whether small and medium-sized companies or corporations: In only 25 percent of German companies does the management take responsibility for IT security. This is proven by the representative study “Cybersecurity in Numbers” by G DATA CyberDefense AG, Statista and brand eins. Cyber ​​attacks on companies and institutions cause high costs and illustrate the importance of extensive IT security measures. With…

Read more

Cybercriminals: This is how they threaten companies in 2024
The new ways of cybercriminals in 2024

In 2024, cybercriminals will increasingly manipulate texts, images and voices with AI and demand increasing ransoms from companies, say the experts at G DATA CyberDefense. What cyber risks threaten companies in the coming year? According to G DATA CyberDefense, artificial intelligence (AI) is increasingly becoming a serious threat to IT security. Cybercriminals are increasingly taking advantage of the great potential of artificial intelligence and endangering IT security with fakes. Further challenges such as increasing regulatory requirements and high ransom demands make IT security even more of a Sisyphean task. Cybercriminals are using AI for more efficient…

Read more

Understanding ransomware in a playful way
Understanding ransomware in a playful way (Image GData)

Companies that fall victim to a ransomware attack often struggle with the effects, such as network failures and lost sales, for months. A new series of games imparts knowledge on the topic. Effective protection against ransomware is essential. In order to specifically sensitize employees to the topic, the G DATA academy is supplementing the security awareness training with a new series of games on ransomware. What's special: The playful approach ensures effective and sustainable learning. According to the BSI's current management report, ransomware is and remains the greatest threat to companies' IT security. One problem: Many employees lack the necessary...

Read more

New vulnerabilities: OneNote, macros, UEFI
New vulnerabilities: OneNote, macros, UEFI - Photo by AltumCode on Unsplash

The threat report shows new attack methods: Cyber ​​criminals exploit UEFI vulnerabilities and misuse Microsoft file formats to circumvent macro security functions. The number of IT attacks averted is stagnating at a high level. This emerges from the current threat report from G DATA CyberDefense. There are numerous vulnerabilities that cybercriminals consistently exploit. How UEFI bootkits disable security features and make systems vulnerable. Another scam used by attackers is manipulated OneNote or Publisher files that contain malware. Vulnerabilities are exploited immediately The current threat report from G DATA CyberDefense proves that attackers quickly react to a changed situation...

Read more

Managed EDR "Made in Germany"
Managed EDR "Made in Germany"

Not enough qualified staff, a high workload and insufficient specialist knowledge: three problems that many companies have with IT security. With G DATA 365 Managed Endpoint Detection and Response, there is a solution where IT managers place IT security in the hands of experienced security experts. Cyber ​​criminals know neither the end of the day nor the weekend. 24/7 protection against attacks with analysts in the background is therefore essential for every company, but cannot be afforded by them themselves. Today, IT managers are not only dealing with mass attacks. Cyber ​​criminals rely on targeted attacks to get into the corporate network. G…

Read more

Mobile device management also for SMEs
B2B Cyber ​​Security ShortNews

The security provider G DATA has completely overhauled its mobile device management and thus also ensures more security for smartphones. The field of mobile security in the network is now also available for SMEs - an area that is usually less well protected. G DATA CyberDefense has fundamentally revised its mobile device management (MDM) solution. With the update, even small companies with five smartphones can now securely manage their devices in the company network with the stand-alone solution, regardless of the endpoint protection chosen. MDM for SMEs with as few as 5 smartphones The MDM solution is available for both Android mobile devices and…

Read more

IT security: Around 100 malware variants per minute
IT security: Around 100 malware variants per minute

The security experts at G DATA CyberDefense identified around 50 million different malware programs in 2022. That is twice as many as in 2021, according to the new threat report from G DATA CyberDefense. Attackers rely on phishing and malvertising. In order to spread malicious code, attackers increasingly rely on malvertising, i.e. malicious advertising, and search engine poisoning in addition to phishing. In addition, the number of defended against cyber attacks rose sharply again in the fourth quarter of 2022. In 2022, cybercriminals released almost 135.000 new variants of their malicious software in one day – more than 93 attack attempts per minute….

Read more

Mobile Security Report: 2 new malware apps every minute 
Mobile Security Report: 2 new malware apps every minute

Android smartphone owners are at high cyber risk. Mobile Security: Although the attacks are fewer, they are much better executed. Two malicious apps per minute threatened Android users in the past year. There is no end in sight. When it comes to Android malware, cybercriminals are currently looking for quality over quantity. The current Mobile Security Report from G DATA CyberDefense shows that the downward trend of the first half of 2022 continued in the second half of the year. In the past year, attackers only published two to three apps with malware every minute. In the year…

Read more

IT security: Untrained employees are a risk

When it comes to IT security, employees in German companies have a lot of catching up to do: almost 34 percent have little or very little skills and are therefore risking the security of their company from cyber attacks - especially in the healthcare sector. Cyber ​​criminals have an easy time in German companies. Due to the poor knowledge about IT security, the workforce is not prepared for an attack in an emergency. More than a third of the survey participants rated personal competence as “low” or “very low”. Only every tenth employee sees himself as having very high abilities in this area. Employees lack...

Read more

Threat Report: Log4J vulnerability further exploited
Log4j Log4shell

Appearances are deceptive: although the number of cyber attacks is declining, cyber criminals are very active right now. The threat report confirms this. While Log4J is still under active attack, criminal actors are also using malware like Berbew, Neojitt, and FormBook to infiltrate organizations. In mid-December 2021, the BSI issued a red alert for the Log4J (also known as Log4Shell) security vulnerability. Even then, the authority warned that cybercriminals were actively exploiting the vulnerability. These fears are currently coming true, as the current threat report from G DATA CyberDefense shows. Targeted attacks on Log4J vulnerability Instead of new waves of attacks…

Read more