News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

State actors and cyber criminals can hardly be distinguished
State actors and cyber criminals can hardly be distinguished

State actors or cyber criminals: the lines are blurring. According to the ESET security experts, the campaigns by state actors have increased. ESET reports on the current situation and gives forecasts for the future. Whether hackers who are supported by governments or financially motivated cyber criminals: It is no longer possible to differentiate between these actors. The boundaries between this and "classic" cyber crime are becoming increasingly blurred. Hacker groups who have drawn attention to themselves through Advanced Persistent Threat (APT) attacks also try to make financial profits from their activities. Conversely, cyber criminals sell their tools on the dark web, for example ...

Read more

Measures against malicious advertising software
Measures against malicious advertising software

The Dark Side of Adware: Measures Against Malicious Advertising Software. Cyber ​​criminals can exploit weaknesses in the verification process of the advertising network or weaknesses in a user's browser to deliver dangerous links or malware. SMEs in particular should be more careful. Adware or ad-supported software is not inherently malicious as a source of income for free service providers, although it has often become synonymous with malvertisement. Non-malicious adware collects data with the consent of the user. For example, users can consent to downloading the free version of an application that displays ads instead of the paid, advertising-free version. To…

Read more

Anatomy of a modern cyber attack
Anatomy of a modern cyber attack

Cyber ​​attacks are seldom carried out by technically skilled attackers. Traditional hacking methods such as decoding encryption or infiltrating firewalls are becoming a thing of the past. The anatomy of a cyberattack is changing. Criminals no longer hack into; they just log in. Because weak, stolen or otherwise compromised login data create an easy gateway for malicious actors, even if they have only limited technical skills. Employee logins stolen The recent data breach on Twitter, in which dozens of prominent user accounts were hijacked, is a good example of how cyberattacks are now ...

Read more

DDos: Hackers bring websites to their knees 
DDos: Hackers bring websites to their knees

When hackers bring websites to their knees: best practices against DDos attacks. Cyber ​​criminals use distributed denial of service (DDoS) attacks to target companies and institutions by causing server or web services to fail. For example, attackers bombard the IP address of a website with so much data traffic that the website and every web server connected to it is overwhelmed with answering the queries. This makes the website inaccessible for users. DDoS hacker attack: simple but effective For attackers, DDoS is a simple, effective and powerful technology that is fueled by insecure devices, especially the steadily growing Internet of Things (IoT)….

Read more

Global statistics from hundreds of hacker attacks
Global statistics from hundreds of hacker attacks

FireEye Mandiant M-Trends 2021: Report provides global statistics and insights from hundreds of different hacker attacks: Average length of stay drops below a month worldwide; The ability to detect threats is improving; The proportion of ransomware continues to rise. FireEye, Inc, the intelligence-based security company, today released the FireEye Mandiant M-Trends Report 2021. The M-Trends report, which is now being published for the twelfth time, combines cybersecurity expertise with threat intelligence and provides statistics and insights from the latest Mandiant deployments worldwide. This year's report provides details on the latest attack techniques and malware, the spread of multilayered extortion and ransomware that ...

Read more

28.04.21/2021/XNUMX Webinar: M-Trends XNUMX in the world of cybersecurity
Fireeye News

28.04.21/2021/12 Webinar: M-Trends 12 in the world of cybersecurity. FireEye Mandiant 2452th edition of the annual M-Trends report with an overview of the trends in global cyber attacks. In the XNUMXth edition of our annual M-Trends Report, we deal with current topics in the world of cybersecurity and provide an overview of the trends that we have observed in attacks around the world. This year's report includes details on the latest attack techniques and malware, the spread of multi-layered extortion and ransomware, preparation for expected UNCXNUMX / SUNBURST counterfeit hackers, growing insider threats, and ...

Read more

Cloud: 90 percent of cyber attacks with login data
B2B Cyber ​​Security ShortNews

Centrify study: 90 percent of hackers use compromised privileged credentials in cyber attacks on the cloud. Cybercriminals are increasingly targeting the cloud in times of remote work. An overwhelming proportion (90 percent) of cyber attacks on cloud environments in the past twelve months involved compromised privileged credentials. This is the result of a new study by Centrify, a leading provider of modern Privileged Access Management (PAM) solutions. 65 percent of the IT decision-makers surveyed had attempted attacks on their cloud environments, and 80 percent of these attacks were also successful. 150 IT decision-makers in the USA surveyed To assess how the dependency on the cloud ...

Read more

Hackers can attack smart sex toys
Eset_News

Hackers can use smart sex toys to blackmail people. ESET researchers discover security flaws in We-Vibe "Jive" and Lovense "Max". ESET researchers have found serious security flaws in two networked sex toys. The We-Vibe “Jive” and the Lovense “Max” achieve high sales figures during the corona pandemic. The immense interest also attracts cyber criminals. The ESET researchers found the weak points in the apps that control the two sex toys. This could allow attackers to install malware on the smartphones being used and also steal data. In addition to possible physical damage from misuse of the devices, there is a risk of stolen photos, ...

Read more

Hackers attack water treatment in Florida
Fireeye News

Hackers have broken into a water treatment plant in Florida. They gained access to the internal ICS platform and changed the chemical values ​​of the water. A comment from FireEye. "The incident illustrates the need for strong IT security in critical infrastructure areas," says Daniel Kapellmann Zafra, Manager of Analysis, Mandiant Threat Intelligence at FireEye, the market leader in intelligence-based security solutions. However, there was no danger to the population as the water manipulation was quickly recognized by the operator. Even if this had not been the case, there would be redundancies (manual quality controls / sampling / testing by registered professional engineers), ...

Read more

Cyber ​​attacks cause $ XNUMX trillion in damage
B2B Cyber ​​Security ShortNews

A study by McAfee reveals the economic damage caused by cyber attacks. According to this, cybercriminal activities are now costing the global economy more than a trillion dollars. Cybercrime costs the global economy over $2018 trillion. This corresponds to about one percent of global gross domestic product (GDP). This is the conclusion of the current study "The Hidden Costs of Cybercrime" by McAfee, which was carried out in cooperation with the "Center for Strategic and International Studies" (CSIS). McAfee study shows drastic increase For comparison: In the study from 600, the worldwide damage amounted to almost XNUMX...

Read more