News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Tenable: Comments on IT security in 2021
Tenable news

Tenable's technology experts provide commentary on the topics they believe will shape the IT security market in 2021. From workarounds to scalable home office strategies Bob Huber, CSO: “During the global pandemic, the CSO's role in protecting the corporate network has shifted from sprint to marathon. Many companies will continue to work remotely in 2021. This presents CSOs with the challenge of maintaining security in these highly dynamic and distributed environments. The initial workarounds are then replaced with scalable, long-term strategies that enable risk-based decision making. A COVID crash course…

Read more

Germany extremely attractive for hackers 
B2B Cyber ​​Security ShortNews

Cyber ​​attacks are one of the greatest threats to the economy. In the course of this, IronHack took an interest in which countries are particularly attractive for hackers and cyber criminals and carried out the following analysis. The result shows that, after the United States, Germany is the country most threatened by cyber criminals. A finding that corresponds with the risk assessments of proven experts. "Almost half of all companies in Germany (46 percent) reported cyber attacks on their company in the past few months," reported the Alliance of Germany in the course of the publication of the DsiN-Praxisreport Mittelstand 2020 in ...

Read more

US Department of Justice charges Russian hackers
Fireeye News

The US Department of Justice is indicting six hackers, members of the Russian military intelligence service, who are said to be responsible, among other things, for the attacks with NotPetya and the influence of MacronLeaks on the French elections in 2017. A statement from John Hultquist, Senior Director of Analysis at Mandiant Threat Intelligence. “Today's indictment against Russian military intelligence officers contains some of the most aggressive cyberattacks and disinformation campaigns we have ever seen carried out by the Sandworm hacking group. These include repeated successful attacks on the Ukrainian power grid, the economically devastating suspected ransomware attacks with NotPetya, the manipulation ...

Read more

US election: Cyber ​​attacks expected
US election 2020 hackers cyber attacks

Many experts expect cyber attacks during the upcoming US presidential election. Sophos sees strategic chaos as a target: "False flag cyberattacks are the greatest security threat in elections," said JJ Thompson, Sophos' senior director of global managed threat response great tension felt in the USA. There is great uncertainty, exacerbated by the still raging pandemic, which very quickly shook up the electoral landscape, and experiences from 3 that are still on people's minds. These are exactly the ...

Read more

Configuration error: easy game for hackers
Network security configuration error hackers

Even if cyber criminals and hackers use increasingly sophisticated attack techniques to break into company networks, security breaches can often be traced back to avoidable, often overlooked misconfigurations. In order not to open the door to hackers to sensitive data and IT environments, here are the five most common configuration errors that companies should avoid. 1. Standard credentials Unconfigured standard user names and passwords for devices, databases, and installations are comparable to leaving the key in a locked door. Even hobby hackers can cause extensive damage to a company with the help of freely available tools. Standard login data on network devices such as ...

Read more

New hacking strategy uncovered
Hacker strategy, attack, hacker

The SophosLabs have uncovered a new hacking strategy. Apparently confused attack methods should let security mechanisms run nowhere. But the forensic scientists at SophosLabs are on to them and have recently unmasked a new method of attack. A new attack method has hit the net for the specialists at SophosLabs. Security experts Fraser Howard and Andrew O'Donnell came across an unusual variant in their hunt for new threats. In summary, the chain of attacks begins with a malicious email message including VB scripting code and ends with the placement of a remote access Trojan called MoDi RAT. During their forensic examinations, the specialists discovered ...

Read more

Detect hacker attacks earlier
Hacker attack

In companies, it is always important to detect hacker attacks as early as possible. A behavior analysis helps to shorten the "dwell time" of successful attacks. In films, hacks are often portrayed as a kind of digital bank robbery: the hackers break through the protective mechanisms of their target in a dramatic way and then only have a few minutes to steal the coveted data, while IT security tries desperately to stop the attackers. The reality looks very different, because in fact the cyber criminals usually make themselves comfortable in the network and sometimes spend months or years there ...

Read more

MobileIron: Mobile Phishing Protection for Everywhere Enterprise
Mail smartphone phishing

MobileIron Threat Defense expands to detect and remediate multi-vector threats. The solution thus protects iOS and Android devices from phishing attacks at the device, network and application level. MobileIron, the mobile-centric security platform for the Everywhere Enterprise, extends MobileIron Threat Defense (MTD) with mobile multi-vector phishing protection for iOS and Android devices. How MobileIron is helping companies ward off one of the greatest cyber security threats. With the extension, MTD offers a device- and cloud-based phishing URL database query that detects and corrects phishing attacks across all mobile threat vectors. MTD does this, for example, in text and SMS messages, instant messages and on social media ...

Read more