News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

2024: AI-based arms race enters the next round
2024: AI-based arms race enters the next round - Frank Reppold on Pixabay

Artificial intelligence and automation provide attackers and defenders with crucial springboards for successful action. These are tools such as AI-based voice chatbots or AI spear phishing tools. As the year nears its end, it is time, as always, for WatchGuard Technologies to look to the future and focus on potential attack trends and developments in the IT security environment. The WatchGuard Threat Lab sees, among other things, malicious prompt engineering tricks that target Large Language Models (LLM) as having a great chance of causing trouble in 2024. The same goes for “vishers” who carry out their malicious operations with...

Read more

Identified: Risky OT and ICS devices in KRITIS

Armis identifies and publishes a study on the most risky OT and ICS devices in critical infrastructure. It shows the threats to critical infrastructure in manufacturing, utilities and transportation. Data analyzed by the Armis Asset Intelligence and Security platform, which monitors more than three billion assets, revealed that the operational technology (OT) and industrial control systems (ICS) devices that pose the greatest risk to these industries are technical workstations , SCADA servers, automation servers, data historians and programmable logic controllers (PLCs). Prioritization and vulnerability management remain an issue Research found that technical workstations…

Read more

Top List for Malware, Vulnerabilities, Attacks
Top List for Malware, Vulnerabilities, Attacks

Check Point Software has released its latest Global Threat Index for December 2022. In terms of malware, QBot has now overtaken Emotet, the Web Server Exposed Git Repository Information Disclosure is the most widely exploited vulnerability, and attackers continue to target the education and research sectors most. Qbot, a sophisticated Trojan that steals bank details and keystrokes, overtook Emotet on its return last month to become the most prevalent malware, affecting 13,49 percent of businesses in Germany. Emotet rises to second place with 5,12 percent...

Read more

Danger from biometric data as authentication
Trend Micro News

A new study shows the dangers of stolen or leaked biometric data. Trend Micro warns that exposed biometrics pose a serious authentication risk for a variety of digital scenarios, including the metaverse. A large amount of biometric data is published on digital platforms every day. These include facial, voice, iris, palm, and fingerprint patterns that can be used to fool authentication systems. Images and audio content posted daily on social media and messaging platforms, news sites and government portals become valuable assets for cybercriminals. A new study...

Read more

Study: Cyber ​​Attackers Most Active During Holiday Season

As a Barracuda analysis shows, the severity of security threats increases during the holiday season from cyber attackers. One in five cyber threats between June and September 2022 presented an increased risk, compared to just one in 80 in January of the year. The latest threat intelligence, coming from Barracuda's XDR platform and 24/7 Security Operations Center, shows how threat severity has evolved in 2022. In January 2022, only about 1,25 percent of threat alerts were serious enough to warrant a security alert to the customer. June to September more potential dangers From the…

Read more

Findings on the Black Basta ransomware group
B2B Cyber ​​Security ShortNews

Unit 42, Palo Alto Networks' malware analysis team, has released a report detailing the Black Basta ransomware group, which first appeared in April 2022 and has been on the rise ever since. Since the emergence of ransomware, members of the group have been very active in distributing and extorting companies. The attackers run a cybercrime marketplace and blog where the group lists their victims' names, descriptions, publication percentage, number of visits, and any data exfiltrated. Black Basta runs its own leak page Although the…

Read more

Cyber ​​security goes far beyond classic endpoints

Cyber ​​security: IP cameras, building access solutions, sensors on assembly lines or printers connected to the web are making the front line of companies to the Internet increasingly confusing and increasing the potential for attack. Four arguments for a "security perspective" on the Internet of Things. If you want to protect yourself against hackers from the Internet of Things, you need more information and access to the IoT hardware - through extended endpoint security. This applies to all companies - especially for production and healthcare, which integrate IoT directly and very strongly into their processes. New IoT hardware due to pandemic…

Read more

A dangerous situation requires a broader perspective
A dangerous situation requires a broader perspective

Four cyber security trends for 2022. The expanded threat situation requires a broader perspective: ransomware payments or resource theft for cryptomining, sabotage, espionage or vandalism. A comment by Thomas Krause, Regional Director DACH at ForeNova. At the end of 4, Log2021j once again made it clear how easy an attack can be for hackers. You only need to exploit existing and emerging vulnerabilities to gain widespread malicious control. The attackers may be pursuing well-known motives: quick money by paying ransoms or stealing resources for cryptomining, sabotage, espionage or vandalism. Nevertheless, new challenges arise for all those responsible for IT security. Four trends...

Read more

IT security trends 2022: AI, Windows 11, ransomware
IT security trends 2022: AI, Windows 11, ransomware

G DATA IT security trends 2022: Artificial intelligence makes cyber attacks more dangerous, multi-ransomware attacks use AI and Windows 11 offers another attack surface with integrated Android apps. Cyber ​​crime will continue to rise in 2022. Attackers consistently exploit every weak point. In order to achieve their goals, they rely on multi-ransomware attacks and use artificial intelligence with which they create better malicious code. The possible integration of Android apps in Windows 11 also offers criminals a new target. Cyber ​​crime will continue to rise in 2022 The trend of increasing cyber crime will continue in 2022. Attackers target companies in particular ...

Read more

Measures against malicious advertising software
Measures against malicious advertising software

The Dark Side of Adware: Measures Against Malicious Advertising Software. Cyber ​​criminals can exploit weaknesses in the verification process of the advertising network or weaknesses in a user's browser to deliver dangerous links or malware. SMEs in particular should be more careful. Adware or ad-supported software is not inherently malicious as a source of income for free service providers, although it has often become synonymous with malvertisement. Non-malicious adware collects data with the consent of the user. For example, users can consent to downloading the free version of an application that displays ads instead of the paid, advertising-free version. To…

Read more