News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cybersecurity in EMEA: These are the trends
Cybersecurity in EMEA: These are the trends

Advanced ransomware, cloud attacks, and AI-based cyberwarfare will threaten corporate cybersecurity in 2025. Phishing is the most common method of distributing malicious files, and educational institutions are the most frequently attacked industry worldwide. Check Point Software Technologies, a pioneer and global leader in cybersecurity solutions, presented key findings from its latest EMEA Threat Intelligence Report at CPX Vienna 2025, the company's annual cybersecurity event. CPX Vienna brings together industry leaders, cybersecurity experts, and policymakers to discuss emerging threats, the impact of AI on cyberwarfare, and the latest security innovations. The latest…

Read more

New Ransomware Ymir Discovered
B2B Cyber ​​Security ShortNews

The experts have discovered a new ransomware with sophisticated obfuscation techniques. The Ymir malware uses whitelist functions to avoid detection. The login data was previously stolen using an infostealer, and only then was the ransomware installed. The Kaspersky Global Emergency Response Team has discovered a new ransomware variant that was used as part of a targeted attack after employee login data was stolen. Ymir uses advanced obfuscation and encryption methods; for example, it does not encrypt certain files on a whitelist in order to avoid detection. It also uses a combination of memory manipulation techniques to inject malicious code directly into the system.

Read more

Cloud apps are at risk
Cloud apps are at risk

A study has examined cloud apps and the threats they pose. The results show how intensively cloud applications are used. This is why cloud apps are a popular target for cyber criminals. Netskope Threat Labs published its latest research report, which focuses on threats from cloud applications in the German market. The report highlights the increasing use of the cloud and the increase in data being uploaded and downloaded to cloud applications. There is also a trend in which attackers are increasingly using cloud apps, especially popular corporate apps, to spread malware such as Trojans. Other important findings are: Use…

Read more

Infostealer AMOS targets macOS devices
SophosNews

macOS devices are increasingly being targeted by cyber criminals - most recently the AMOS infostealer family was noticed, which is responsible for more than 50 percent of all attacks on the Apple operating system. Rumors also suggest that the criminals want to expand their target area to iOS. It has long been believed that the macOS operating system is less vulnerable to malware than Windows. This may be due to its lower market dominance and various security features that require different approaches from malware developers. It was assumed that only unconventional attacks and malware had a chance here...

Read more

Phishing: Attacks with infostealers for data exfiltration
B2B Cyber ​​Security ShortNews

Threat analysts have observed phishing attacks that use an advanced, stealthy approach to exfiltrate particularly large amounts of sensitive data. During the attack, the attacker downloads additional malware. The approach is based on the use of an advanced infostealer malware that is able to collect PDF files and directories from most folders, as well as browser information such as session cookies, stored credit card data, Bitcoin-related browser extensions, web logs and other information. The attackers then send the information as a compressed attachment to a remote email account. Not just simple data theft Infostealers do not usually collect and exfiltrate such…

Read more

Free AI tool with hidden malware 
B2B Cyber ​​Security ShortNews

Kaspersky experts have discovered a new malware campaign that exploits the popularity of AI tools. An AI voice generator is offered free of charge. However, the malware Gipy is hidden inside, which immediately calls for reinforcements after execution, such as RATs and password stealers. The dangerous Gipy malware disguises itself as an AI voice generator and is distributed via phishing websites. It is able to steal passwords and data as well as cryptocurrencies and download other malware. The five most affected countries are Russia, Taiwan, the USA, Spain and Germany. Companies should prohibit the use of such tools and AIs via compliance regulations....

Read more

Cloud provider: Customers attacked with Frostbite malware
B2B Cyber ​​Security ShortNews

According to experts, many customers of the cloud provider Snowflake are currently being targeted. To do this, the attackers are using the FROSTBITE malware - a new infostealer, according to the Google subsidiary Mandiant. Mandiant published new research results that show that a financially motivated threat actor identified as UNC5537 is targeting Snowflake customers by using previously stolen credentials - mainly via infostealer malware - to access customer databases. According to several sources, one known victim appears to be the event organizer Ticketmaster, which has lost a lot of customer data. So far, however, Mandiant has...

Read more

Malware: Infostealers steal around 51 login details per device
Kaspersky_news

Malware attacks to steal credentials from companies are increasing. Kaspersky examined compromised login data between 2020 and 2023. 53 percent of all infostealer attacks hit company computers. According to a Kaspersky study, the threat from infostealers who steal account log files and offer them for sale on the dark web is increasing. Cybercriminals obtain an average of 51 login details per device; per stolen log file to two access points to company applications. Between 2020 and 2023, corporate computers accounted for 53 percent of all infostealer attacks discovered and increased by 34 percentage points. After infecting a single device, cybercriminals potentially gain access to…

Read more

Hackers find ways into Google accounts
B2B Cyber ​​Security ShortNews

According to researchers at Cloudsek.com, hackers are abusing an undocumented Google OAuth endpoint called “MultiLogin.” The experts are currently observing that other groups of cyber attackers are copying the technology and using it in their infostealers. Is a bigger wave coming now? Several information-stealing malware families exploit an undocumented Google OAuth endpoint called “MultiLogin” to recover expired authentication cookies and log in to user accounts. Even for accounts where the account password has been reset. Infostealer groups want to exploit the vulnerability The experts at Cloudsek.com report: The Lumma Infostealer, which contains the discovered exploit, was implemented on November 14th...

Read more