News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Securing IoT and connected devices
B2B Cyber ​​Security ShortNews

The report, “Digital Trust in a Connected World: Navigating the State of IoT Security,” highlights the concerns and challenges modern organizations face when it comes to building digital trust in today’s connected world. The report shows that almost all companies (97%) are struggling to secure their IoT and connected products to some degree. The survey also found that 98% of companies experienced certificate outages in the last 12 months, costing an average of over $2,25 million. Protection for…

Read more

IoT: Prepared for post-quantum security
IoT: Prepared for Post-Quantum Security - Image by Pete Linforth from Pixabay

Many companies are unprepared for the transition to post-quantum cryptography. Keyfactor aims to use PKI and cryptographic management to guide companies through the transition to post-quantum security, particularly in securing emerging IoT devices. Keyfactor today announced the release of two product updates: EJBCA 8.0 and SignServer 6.0. The updates bring significant advances in IoT (Internet-of-Things) security and lay the foundations for post-quantum readiness, as many organizations see greater security needs and protection against cyberattacks in relation to recent developments in these areas. New Features of EJBCA 8.0 Preparing for Post-Quantum Support of…

Read more

Mirai botnet is targeting the first solar parks
B2B Cyber ​​Security ShortNews

The portal arsTechnica reports that hundreds of Internet-connected devices in solar parks are still not patched against a critical and actively exploited vulnerability. Attackers can easily disrupt operations from a distance or gain a foothold in the systems. The Mirai botnet already seems to be exploiting the vulnerability. The devices, sold under the SolarView brand name by Contec based in Osaka, Japan, help people in solar arrays monitor the amount of electricity they're generating, storing and distributing. According to Contec, around 30.000 power plants have introduced the devices,…

Read more

BSI study: Industrial IoT microcontrollers are vulnerable
B2B Cyber ​​Security ShortNews

The BSI publishes a study on possible attacks on microcontrollers that are installed in industrial IoT in the aviation or automotive sectors in particular. The study shows that several attacks on microcontrollers are possible, but can be prevented with the right software. The Fraunhofer Institute AISEC prepared the study "A Study on Hardware Attacks against Microcontrollers" on behalf of the Federal Office for Information Security (BSI), which presents the current status of hardware attacks on microcontrollers. Study shows attack possibilities The publication describes easy-to-implement countermeasures that can prevent many attacks or reduce the effort for…

Read more

New security regulations for IoT
B2B Cyber ​​Security ShortNews

More and more devices are connected to the Internet, not only in the private sector, but also in industry. This makes production more efficient and increasingly automated, which saves costs and labor. The Internet of Things (IoT - Internet of Things) is therefore spreading rapidly and the number of connected devices is increasing significantly. But with the growing reliance on IoT devices, the need for strong cyber security measures has become even more pressing. The legislators have recognized this. To protect the important data stored on these devices, governments on…

Read more

EU Cyber ​​Resilience Act: Guide against risks and fines
EU Cyber ​​Resilience Act: Guide against risks and fines

The theft of data, digital blackmail, espionage and sabotage caused damage to the German economy of around 2022 billion euros in 203. The EU Commission's EU Cyber ​​Resilience Act (CRA) is a legal obligation to improve product cybersecurity across the European Union. A free guide helps to better recognize future legal obligations and to avoid possible risks and fines Cyber ​​threats are one of the biggest risks for companies and the economy as a whole and have caused enormous damage in recent months. According to the “Wirtschaftsschutz 2022” study by the industry association BITKOM, in…

Read more

IoT as a security issue
IoT as a security issue

Connected IoT devices offer huge potential for innovation - and can still pose a major problem for IT: three major security risks and recommendations for concrete measures to increase IoT security in the long term. The IoT market is growing dynamically in many areas: from smart household appliances and intelligent building systems to self-monitoring industrial plants. The networked devices offer countless advantages, but also represent a large attack surface. In detail, users should always keep an eye on three security threats that the IoT brings with it: hard-coded credentials, the infrequent IoT firmware updates and the limited IoT -Visibility….

Read more

Novel OT and IoT endpoint security sensor
Novel OT and IoT endpoint security sensor

A new OT and IoT endpoint security sensor aims to provide more security. Nozomi Networks introduces the first security sensor for this area of ​​application, which is intended to drastically reduce operational reliability. Nozomi Arc aims to be the industry's first OT and IoT sensor to bring more security to the endpoint. This sensor dramatically shortens the time it takes to develop significantly higher resilience in operational use. Nozomi Arc is designed to be automatically deployed across a large number of locations and devices wherever a business needs more visibility. The new sensor also provides important data...

Read more

OT/IoT Security Report: Botnets Attack IIoT
OT/IoT Security Report: Botnets Attack IIoT

A cybersecurity threat analysis for the second half of 2022: Cyber ​​attacks via botnets on critical infrastructures with IoT / OT continued and targeted rail transport, energy sector, manufacturing and hospitals. The latest OT/IoT Security Report from Nozomi Networks Labs reveals that wiper malware, IoT botnet activity, and the Ukraine War were major drivers of the 2022 threat landscape. As in the first half of 2022, the company's researchers have observed cybercriminals shifting their tactics from data theft and distributed denial of service (DDoS) attacks to more destructive malware. The aim here was to…

Read more

2023: Enterprises must optimize their IT defenses
2023: Enterprises must optimize their IT defenses

Cyber ​​criminals never stand still. They constantly improve their methods and intensify their attacks on available targets. In 2023, companies will once again be faced with the task of further optimizing their IT defenses. When it comes to cyber insurance, a good defense is also expected or there is no policy. 2022 was not a quiet year for IT security either. Hackers have crossed new borders: Organized criminals attacked governments, like Conti in the Costa Rica case. The Lapsus$ group attacked well-known players in the digital economy such as Microsoft, Nvidia, Uber, Globant and others. Hacker collectives developed sophisticated, powerful tools for…

Read more