News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protecting identities and access
Protecting identities and access

A European cybersecurity provider and identity and access management expert, announces the launch of its SaaS platform, Wallix One. The platform includes the essential solutions companies need to protect their digital activities. This means that employees, external service providers, IT administrators, PLC maintenance personnel or machines and robots only receive access to IT or OT infrastructures, devices, applications and data after their identity and the rights granted to them have been verified. Outsourcing the management of identity and access security solutions to Wallix One offers IT security managers several advantages: control over access to important company resources, reduction of the risks associated with identity theft…

Read more

AI threatens cybersecurity
B2B Cyber ​​Security ShortNews

With the help of AI, cyber threats are taking on a new form. Criminals use this to target identities and bypass authentication mechanisms. These are all new AI attack vectors. Artificial intelligence (AI) is impacting modern society at an unprecedented pace. ChatGPT and other generative AI tools offer many advantages, but they can also be used by attackers and thus cause a lot of damage. CyberArk Labs has now examined this evolving threat landscape to better understand what new AI attack vectors mean for identity security programs and to help develop new defense strategies...

Read more

Web 3.0 offers new attack surfaces
Web 3.0 offers new attack surfaces

The emergence of Web 3.0 came at a time when the world was changing fundamentally. At a time when people were told to stay at home and limit personal contact, life had to go on. Business had to continue as usual, contracts had to be concluded and money transferred. Web 3.0 became an opportunity for companies to tap into the digital future. Today, everything can and is done digitally, and while the benefits are clear, new risks and challenges have emerged. With the transition…

Read more

Accomplice AI: Theft of identity data 
Accomplice AI: Theft of identity data - Image by Eric Blanton from Pixabay

Identity data has always been one of cybercriminals' favorite loot. With their help, account compromises can be initiated and identity fraud committed. Now ChatGPT & Co are also helping with perfect phishing emails. A statement from Dirk Decker, Regional Sales Director DACH & EMEA South at Ping Identity. The attackers usually use social engineering and phishing. The success rate of such attacks, mostly based on sheer mass, is limited. Individualized emails and messages tailored to a victim offer significantly higher success rates, but also require significantly more work...

Read more

Identity-related risks are increasing
Identity-related risks are increasing

The new global study "2023 Identity Security Threat Landscape" shows that identity-based cybersecurity risks continue to rise. The reasons for this are, on the one hand, the difficult economic conditions and, on the other hand, the pace of technological innovation, including the dynamic development of artificial intelligence (AI). Businesses continue to drive digital and cloud initiatives. Failure to invest adequately in cybersecurity will quickly result in a larger, unsecured, identity-centric attack surface. CyberArk's Identity Security Threat Landscape Report takes stock. Developments in Germany Almost all respondents (99%) expect an increase in identity-related risks...

Read more

Security risk stolen identities
Security risk stolen identities

Compromised digital identities and user accounts represent one of the biggest cybersecurity risks for companies - this is the key finding of the Identity Breach Report 2023. A total of 1,5 billion records were stolen in this way worldwide in 2022, with an average loss for companies of 9,4, $XNUMX million per case. The situation is developing in a critical direction for many companies and industries for two reasons: On the one hand, attackers can use the stolen identities, user accounts and data as a springboard for further attacks. In addition, threat actors are increasingly using artificial intelligence for their attacks...

Read more

Focus on identities
Focus on identities

A new approach to IT security focuses on identities. In recent years, more and more companies have switched to hybrid and decentralized work environments. With this shift, IT teams have learned that they can't trust the network like they used to. Employees now have direct access to their company's resources over the Internet, bypassing traditional security tools such as virtual private networks (VPNs) and firewalls. The shift isn’t just limited to the network—remote working has proven that anyone, anywhere, with anyone…

Read more

Security platform: protection of identities
Security platform: protection of identities

At its CyberArk Impact 2022 security conference, CyberArk unveiled several innovations that take identity protection to a new level. The extensions relate to privileged access management, identity management, cloud security and secrets management - and thus support companies in the implementation of zero trust strategies. Companies face major challenges. On the one hand, they must minimize the security threats associated with increasing cloud use and adoption of SaaS and the resulting increase in the number of identities. On the other hand, defensive measures need to be strengthened in order to be able to face increasingly sophisticated attack scenarios...

Read more

Credit card thieves steal money and identities
Eset_News

Around 45 million credit cards are in circulation in Germany alone (source: VuMA) - from private individuals, companies and their employees. A lucrative target for cybercriminals. Experts estimate that around 24 billion data sets ranging from access to e-mail addresses to financial information are available on the Dark Web. One of the most coveted is fresh credit card details, which scammers buy in bulk to subsequently commit identity fraud. What should Internet users pay particular attention to in 2022? In an article on WeLiveSecurity, ESET experts shed light on the five popular tricks used by cybercriminals to steal credit card data. 24 billion…

Read more

Defend against identity-based attacks in real time
Defend against identity-based attacks in real time

Identity-based attacks that abuse compromised credentials to access resources are a blind spot in enterprise security defenses. For example, while there are real-time protection solutions against various types of attacks such as malware, malicious data access and its exfiltration, there is no protection against a scenario in which attackers authenticate themselves with valid but compromised credentials. A paradigm shift is therefore required to counter these attacks effectively. User identities must be treated as distinct attack vectors with specific characteristics and properties. This article examines why existing security portfolios fail against identity-based attacks and what measures companies are taking...

Read more