News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Network traffic: Analysis by AI and security experts
Network traffic: Analysis by AI and security experts

There are two types of cyberattacks: Automated opportunistic attempts to penetrate a network and targeted Advanced Persistent Threat (APT) attacks. The former are in the majority and artificial intelligence (AI) can automatically block most of them. But behind an APT there are often people. Defending against such network-level attacks requires both AI and security experts. The hackers show up first through the traces of their malware in the network. However, these anomalous traffic patterns are easily lost in the mass of information. Left to their own devices, the human IT manager is overwhelmed when...

Read more

Media and journalists targeted by state hackers
Media and journalists targeted by state hackers

Proofpoint IT security researchers have witnessed various state-sponsored hacker groups targeting journalists for espionage, spreading malware and infiltrating media organization networks. Journalists and media organizations are attractive targets for cybercriminals. Proofpoint researchers have observed that APT cybercriminals, particularly those sponsored by or affiliated with a state, routinely impersonate or target journalists or media organizations. The media sector and the people working there can open doors that remain closed to others. Targeted Attacks on Journalist Mail Accounts A well-timed, successful attack…

Read more

Vulnerability Report 2021: Many critical vulnerabilities
B2B Cyber ​​Security ShortNews

The experts at Citadelo have presented the new Vulnerability Report 2021. The penetration tests carried out worldwide served as the data basis. 50 percent of the projects examined had at least one critical weakness. Citadelo, one of the fastest growing cybersecurity companies in Europe based in Zug, Switzerland, has presented its 2021 vulnerability report - and is sounding the alarm. “On average, 50% of the projects had at least one critical vulnerability, and medium to high vulnerabilities were found in almost all projects tested,” said Mateo Meier, Board Member of Citadelo. Critical Vulnerabilities with Disastrous Consequences While less severe vulnerabilities…

Read more

IHK is the victim of a cyber attack – website paralyzed
B2B Cyber ​​Security ShortNews

The German Chamber of Commerce and Industry was the victim of a cyber attack. Currently, the homepage of the IHK only shows the note "Service currently not available" and refers to the page of the "DIHK - Deutscher Industrie- und Handelskammertag". The Chamber of Industry and Commerce fell victim to a massive cyber attack. At least that's what Michael Bergmann, the general manager of the IHK Mittleres Ruhrgebiet, says via LinkedIn. He wrote there: “Hacker attack on the IHK organization. Unfortunately, a serious IT security incident occurred yesterday. The IHK organization was subjected to a massive cyber attack. As a security measure, all Internet connections were blocked immediately. As a result, both…

Read more

Energy supplier Entega hacked – data is on the dark web
B2B Cyber ​​Security ShortNews

ENTEGA IT subsidiary COUNT+CARE GmbH & Co. KG was attacked back in June, the system data was encrypted with ransomware and a lot of customer data was stolen. According to Entega, a ransom in the high tens of millions was demanded, which was not paid. Well, in July 2022, much of the customer data can be found on the dark web, as threatened. According to experts, the APT group "Black Cat" is at work here. Cyber ​​criminals who attacked the ENTEGA IT subsidiary COUNT+CARE GmbH & Co. KG on the second weekend in June transferred personal data from ENTEGA customers, employees and business partners to the so-called…

Read more

Hacking competition uncovers 25 zero-day vulnerabilities 
Trend Micro News

Trend Micro's Pwn2Own brings well-known technology manufacturers together and promotes vulnerability research. The hacking competition thus increases security for around 1 billion end users. Participating as partners: Microsoft, Tesla, Zoom and VMware. There was also 1 million in prize money. Trend Micro, one of the world's leading providers of cyber security solutions, is once again positioning itself as a technology innovator with the hacking event Pwn2Own. On the occasion of the 15th anniversary of the event, 25 zero-day vulnerabilities were uncovered at software providers. These include the partners Microsoft, Tesla, Zoom and VMware. Participants were recognized for their efforts with prize money of more than...

Read more

State hackers: disinformation campaigns against Ukraine 

Research by Mandiant provides a comprehensive analysis of the various disinformation campaigns that have been observed since the Russian invasion of Ukraine began. New insights into those responsible for the attacks point to hacking groups supported by the Russian, Chinese and Iranian governments. The report reveals new disinformation campaigns that have not previously been reported, makes new attributions to Chinese and Iranian hacker groups that have simultaneously launched their own disinformation campaigns, and illustrates that the various cyber attacks have been accompanied by disruptive and destructive military attacks on Ukraine. Disinformation campaigns against Ukraine One of the lead authors…

Read more

APT 41: Global Chinese Cyber ​​Espionage Campaign
APT 41: Global Chinese Cyber ​​Espionage Campaign

Cybereason Uncovers Global Chinese Cyberespionage Campaign Targeting North American, European and Asian Companies “Operation CuckooBees” unveils the elusive Winnti Group (APT 41), which has been operating undetected since 2019 against defense, energy, aerospace, Biotech and Pharma operates. Cybereason, the XDR company, releases new research on Operation CuckooBees. The 41-month investigation into the global cyberespionage campaign shows that the Winnti Group (APT 12) is targeting industrial companies in North America, Europe and Asia. Target groups are companies from the fields of defence, energy, aerospace, biotechnology and pharmaceuticals. XNUMX Month Investigation: Operation CuckooBees…

Read more

BSI: Combination of vulnerabilities makes VMware products vulnerable
B2B Cyber ​​Security ShortNews

The BSI reports that a combined exploitation of critical vulnerabilities can allow the takeover of selected VMWare products. The issue has a warning status of Yellow. The Common Vulnerability Scoring System (CVSS) rates the vulnerabilities at 7,8 (high) and 9,8 as critical. On May 18.05.2022th, 2022, the company VMWare published the security advisory VMSA-0014-2022 with information on two critical vulnerabilities in various VMWare products. A combined exploit of the CVE-22972-2022 and CVE-22973-XNUMX vulnerabilities could allow attackers to gain administrative access with root privileges without authentication. The following products are affected by these two vulnerabilities: VMware Workspace…

Read more

FBI, CISA and NSA warn of hacker attacks on MSPs
B2B Cyber ​​Security ShortNews

Members of the Five Eyes (FVEY) intelligence alliance have warned managed service providers (MSPs) and their customers that they are increasingly vulnerable to supply chain attacks. They also provide advice on how MSPs can better protect themselves with tactical measures. Several cybersecurity and law enforcement agencies from FVEY countries ( NCSC-UK , ACSC , CCCS , NCSC-NZ , CISA , NSA , and the FBI ) have collectively provided guidance for MSPs to protect networks and sensitive data against these escalating cyber threats. Warning to MSPs and their customers Today's advice includes specific measures to secure…

Read more