News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Identity Convergence, Private GPTs and AI Attacks
Identity Convergence, Private GPTs and AI Attacks

In 2024, IT was shaped by numerous innovations in AI and large language models, for example. New attack vectors such as AI model jailbreaking or prompt hacking have also emerged. CyberArk takes a look at the trends of 2025. 2025 will again bring a number of new developments, challenges and opportunities in IT and cybersecurity. CyberArk sees three areas in particular that companies should keep an eye on: the convergence of physical and digital identity, the introduction of private AI models and AI-driven cyberattacks. Convergence of physical and digital identity Nowadays…

Read more

Security services with support for Microsoft Entra ID

There is a new update to the HYCU R-Cloud data protection platform that brings far-reaching innovations. This offers customers additional protection for their identity and access management (IAM) solutions with support for Microsoft Entra ID. With the announcement, companies receive item-level backup and recovery for Microsoft's widely used IAM solution together with Okta and cloud security services. With the latest SaaS integration, the total number of supported applications and cloud services has increased to over 80, making HYCU the number one SaaS data protection platform for users of SaaS applications who need fast recovery,...

Read more

Secure digital identity ensures digital trust
Secure digital identity ensures digital trust Image: Image by Paul Mahon on Pixabay

Through a decentralized public key infrastructure (PKI), companies use different procedures. There is no central tracking of certifications. The result: many companies today do not know how many certificates are in circulation in their ecosystem, who controls them and when they need to be renewed. In order to successfully implement digital business models, companies must ensure that their employees, partners, suppliers and customers have the greatest possible digital trust in their digital ecosystems - their infrastructures and all the digital identities operating on them. This is based, to a large extent, on...

Read more

Reduce risky account permissions in identity systems
Reduce risky account permissions in identity systems Image: Bing - AI

Companies should reduce risky account permissions in identity systems. The Semperis Delegation Manager helps IT teams enforce a security-focused delegation model for identity systems to reduce overprivileged accounts and excessive access rights. The Delegation Manager, an Active Directory (AD) rights management solution, enables granular control of permissions for specific groups. This saves IT teams responsible for access control time while closing security gaps that cyber attackers routinely exploit. CISA lists AD misconfigurations The CISA (Cybersecurity and Infrastructure Security Agency) lists various AD misconfigurations in its list of the most common AD misconfigurations that can be exploited by attackers.

Read more

For businesses: Browsers with identity-based protection
For businesses: Browsers with identity-based protection MS - AI

Now it's available: The CyberArk Secure Browser for companies. It is the first browser to offer greater security and privacy with identity-based protection, combining both with a familiar, productive user experience. The CyberArk Secure Browser relies on intelligent permission controls and can be easily deployed on a variety of devices. It was developed specifically for a cloud-first world and enables secure access to on-premises resources and SaaS applications. The browser provides security teams with unparalleled visibility, control and governance, helping to prevent the misuse of compromised identities, devices and credentials...

Read more

Finance: Many identity-related security breaches 
Finance: Many identity-related security breaches

According to the SailPoint study, identity-related security breaches are on the rise in financial services: An incredible 93 percent of respondents said they had been affected in the last two years. SailPoint Technologies has published the study "The state of identity security 2023: A spotlight on financial services". The study highlights the need for better identity security in the financial services industry and shows that more and more financial service providers are placing a high priority on identity security, but attacks on corporate security are still commonplace. 93 percent of respondents said that they had been affected in the…

Read more

Why hackers are bombarding users with MFA requests
Why hackers are bombarding users with MFA requests

MFA Prompt Bombing is an effective attack method used by attackers to gain access to a system protected by Multi-Factor Authentication (MFA). The attacker sends a large number of MFA approval requests to a user in order to overwhelm them with the requests. One wrong click and an attacker has access. Regardless of the level of MFA Prompt Bombing harassment, the goal is for the user to accept the MFA request and grant access to accounts or provide a way to run malicious code on a targeted system. The security industry views MFA prompt bombing attacks as a…

Read more

The Metaverse demands a new level of cyber and data security
The Metaverse demands a new level of cyber and data security

Even if the topic “Metaverse or Metaversum” is still acknowledged with a shrug of the shoulders in many places, especially in Europe, its development is picking up speed, especially in the USA. The Metaverse requires an evolution in cybersecurity. The well-known tech giants in particular are investing billions to turn the trend concept into a (virtual) reality. In addition to many opportunities, this new space also brings with it quite a few challenges ... one of which is cyber and data security. Cyber ​​attacks are also a reality in the Metaverse The Metaverse is a new reality and a platform that offers both opportunities and…

Read more

$2,4 billion damage: When the wrong CEO requests money
$2,4 billion damage: When the wrong CEO requests money

According to the FBI, CEO fraud is the most costly online scam, with fraudsters causing a total of $2021 billion in damage in 2,4. Here, a scammer requests a high referral from a company employee through the CEO's channels or with the identity. ESET shows how companies can get a grip on the threat. When it comes to IT security, people are usually the weakest link in the chain - this also applies to social engineering, a form of phishing. CEO fraud, a variant of social engineering, has caused more damage to victims in 2021 than…

Read more