News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Security monitoring offers protection on a small budget
Security monitoring offers protection on a small budget

Smaller companies are also the target of cyber attacks. If your IT budget is limited, security monitoring can contribute to greater security. Too small to be attractive to hackers? This self-deception no longer works because cybercriminals now use a wide range of attack strategies. If just one attack is successful, it can threaten the company's entire existence. Security despite tight budgets But what if the budget for effective protective measures is limited? Wolfgang Kurz, managing director and founder of indevis, cites security monitoring as a possible answer - a lot can be achieved even with a small budget. The…

Read more

Phishing via Microsoft Sharepoint
Checkpoint News

Hackers use not only Google but also Microsoft Sharepoint for advanced phishing campaigns. Check Point Research (CPR), the threat intelligence division of Check Point® Software Technologies Ltd. presents the third case of misusing a legitimate tool to disguise phishing campaigns. In addition to Google Collection and Google Ad, Microsoft SharePoint is now being added. The program is mainly used to send phishing e-mails to give them a deceptively real look. How hackers use Microsoft Sharepoint The security researchers describe how hackers misuse the program to send phishing e-mails. An example: The link leads…

Read more

With the help of AI: Increasing cyber attacks on companies
Increasing cyber attacks on companies using AI

While in the past certain industries were the preferred targets, hackers are now targeting any company potentially able to pay the ransom. In addition, with the help of generative AI systems such as ChatGPT, cybercriminals can carry out far more attacks in less time. Daniel Hofmann, CEO of Hornetsecurity, explains why generative AI models are becoming an attack turbo and what good protection should look like. The Cyber ​​Security Report 2023 shows that the most common attack method is still (spear) phishing. These social engineering attacks target humans as the greatest vulnerability…

Read more

Iranian Hackers: Cyber ​​Attacks on Western Political Experts
B2B Cyber ​​Security ShortNews

Proofpoint's cybersecurity experts have released an investigation into the Iran-directed hacking group TA453, also known as Charming Kitten, PHOSPHORUS and APT42. The group has recently started targeting people specializing in Middle East-related issues, nuclear safety and genetic research. Each of their most recently observed email attacks used multiple fake identities. To do this, TA453 used the identities of real people working in Western foreign policy research institutions. The attacks also use new social engineering tactics to carry out work on behalf of the…

Read more

Bureau 325: North Korea and its state hacking
B2B Cyber ​​Security ShortNews

State-led hacker attacks are usually assigned to one of the "Big Four": Russia, China, Iran or North Korea. North Korea's early attacks were primarily directed at South Korea, but in recent years Western countries have also become targets of their financially motivated and espionage-related operations. Based on current research, Mandiant has compiled an overview of North Korean hacking groups and provides information about their connection to the North Korean government. Historically, most North Korean cyberattacks have been attributed to the notorious Lazarus group. New research suggests North Korea's government has various...

Read more