News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Vulnerabilities: BSI recommends Chrome and Microsoft Edge Update
B2B Cyber ​​Security ShortNews

New vulnerabilities could allow attackers to execute code and control browsers remotely. The BSI therefore urgently recommends updating the browser, which is also very easy to do. The CVSS value of 8.8 is considered highly dangerous. The Federal Office for Information Security (BSI) warns users and companies of highly dangerous vulnerabilities with the CVSS value 8.8 in the Google Chrome and Microsoft Edge browsers under the Windows, MacOS and Linux operating systems. A remote, anonymous attacker could exploit multiple vulnerabilities in Google Chrome and Microsoft Edge to...

Read more

Hackers find ways into Google accounts
B2B Cyber ​​Security ShortNews

According to researchers at Cloudsek.com, hackers are abusing an undocumented Google OAuth endpoint called “MultiLogin.” The experts are currently observing that other groups of cyber attackers are copying the technology and using it in their infostealers. Is a bigger wave coming now? Several information-stealing malware families exploit an undocumented Google OAuth endpoint called “MultiLogin” to recover expired authentication cookies and log in to user accounts. Even for accounts where the account password has been reset. Infostealer groups want to exploit the vulnerability The experts at Cloudsek.com report: The Lumma Infostealer, which contains the discovered exploit, was implemented on November 14th...

Read more

Phishing via Google
B2B Cyber ​​Security ShortNews

Over the last few months, hackers have repeatedly been observed exploiting the online services of well-known hyperscalers such as Google to make phishing emails appear legitimate. The abused services included PayPal, Microsoft SharePoint, AWS, Facebook Ads and various Google services such as Google Looker, Google Collection and Google Ads. With Google Groups, CPR has now identified another application from the global tech company that is being used for phishing spoofs. From the perspective of hackers, Google tools are particularly inviting for data theft because Google services are free and easy to use. Google also has a variety of tools:…

Read more

Invest in post-quantum cryptography
B2B Cyber ​​Security ShortNews

Google is already using a quantum-safe encryption process (post-quantum cryptography) in its latest version of the Chrome browser. Companies should do the same. The quantum-safe key encapsulation process in the Chrome browser protects the exchange of symmetric keys when establishing secure TLS connections. Is this step necessary even though practical use of quantum computers is not yet foreseeable in the near future? Yes, says Nils Gerhardt, CTO at Utimaco. Preparing for the future “In fact, we cannot yet say when practical use of quantum computers can be expected or when criminals will have access to them. But…

Read more

Google: VirusTotal customer file with secret services
B2B Cyber ​​Security ShortNews

According to various media, a small but highly explosive text file is currently buzzing through the web: a list of over 5.600 VirusTotal customer names. It contains the names of employees of German and US secret services. You have registered with VirusTotal. The text file may be tiny, but the names on VirusTotal's customer list show that many public bodies, agencies and companies use the service and have data checked. After all, it's quite convenient, because there you can currently check data or web addresses online using over 70 different antivirus programs and malware scanners....

Read more

Again vulnerabilities in Android 11, 12, 13
B2B Cyber ​​Security ShortNews

Android published a new list of over 40 vulnerabilities for Android 11, 12 and 13 in May. The good news: there are no critical vulnerabilities. The bad: apart from one gap, all others are considered highly dangerous. The first manufacturers are already rolling out the updates. Users should check the update area of ​​the smartphone more often and possibly initiate the update manually. In Google's security bulletin for May there is again a very long list of security problems. They cover the areas of frame, system, kernel or graphics. Almost all of the listed vulnerabilities are classified by Google...

Read more

Chrome seals 7 highly dangerous gaps
B2B Cyber ​​Security ShortNews

Chrome's bug bounty program is worth it: programmers and specialists reported 7 highly dangerous vulnerabilities to Google and received a reward. Google also immediately provides the updates for users. Sole proprietorships and SMEs should be prepared to click one more time. The latest Chrome update contains 7 updates for high-risk vulnerabilities. In companies, the admins ensure that Chrome remains up to date. Individual companies and SMEs should definitely click in the help area - the further update happens automatically. Work PCs often run through and as long as the browser is not closed and restarted...

Read more

Chrome: New patches for security vulnerabilities
B2B Cyber ​​Security ShortNews

All Chrome users should take the time to update to version 109.0.5414.119 /.120. With the update, Google closes 4 security gaps, 2 of which are considered highly dangerous. An update is done quickly. A user and experts have found new vulnerabilities in Chrome and reported them to Google. There they reacted immediately and incorporated the patches into a new version. The official or stable build is 109.0.5414.119 /.120 for Windows, for Mac and Linux Mac and Linux to 109.0.5414.119. Two Serious Vulnerabilities While the first vulnerability was found in the WebTransport (CVE-2023-0471) of the client-server transfer engine…

Read more

Malware in business apps spies on Facebook accounts
B2B Cyber ​​Security ShortNews

According to Facebook, or rather its parent company Meta, it has found over 400 malware-infected Android and iOS apps in the Google and Apple stores. The apps should tap and forward Facebook access data. Interesting: Meta also found many malicious business or ad management apps. This year, Meta security researchers found more than 400 malicious Android and iOS apps designed to steal Facebook credentials and compromise people's accounts. These apps were listed in the Google Play Store and Apple's App Store and classified as games, VPN services, business apps...

Read more

Record: DDoS attack blocked with 46 million hits
B2B Cyber ​​Security ShortNews

Google also offers the Cloud Armor service in its cloud services. This is intended to protect customers from DDoS attacks. In June, the network repelled the largest ever DDoS attack (layer 7) with 46 million requests per second. In recent years, Google has observed that distributed denial of service (DDoS) attacks are increasing exponentially in frequency and size. Today's internet-facing workloads are at constant risk of attack. The impact degrades the performance of legitimate users. In addition, there are increased operating and hosting costs up to the complete unavailability of business-critical workloads. 46 million hits PER second! At the…

Read more