News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hacker attack on many German chambers of crafts
B2B Cyber ​​Security ShortNews

Most of the websites of the 53 German Chambers of Crafts are currently unavailable. All of them show the same picture that they are disturbed due to a system failure. However, individual chambers have already confirmed a hacker attack on the IT service provider. At the moment you can quickly find out which chamber of crafts operates its systems or at least the homepage of the IT service provider ODAV in Straubing, Bavaria. All web addresses are currently redirected to www.hwk-info.de and only show an information banner with the note “Our homepage is currently not accessible!”. There is also the information “We are working hard to improve our systems...

Read more

IT problem solvers with AI: AI Assistant for Observability
IT problem solvers with AI: AI Assistant for Observability - Image by Faisal Mehmood on Pixabay

Elastic Announces Launch of AI Assistant for Observability and General Availability of Universal Profiling. Transforming the observability of complex cloud-native environments: centralized and limitless end-to-end visibility for site reliability engineers (SREs). Elastic, the company behind Elasticsearch®, announces the launch of the Elastic AI Assistant for Observability and the general availability of Universal Profiling™. This provides Site Reliability Engineers (SREs), regardless of their level of experience, with context-specific, relevant and actionable operational insights into their respective IT environment. Today's IT operations teams face ever-changing system challenges and issues specific to their particular IT environment...

Read more

Large gaps in Detection & Response in the OT area
Large gaps in Detection & Response in the OT area - image by Pete Linforth from Pixabay

A new report reveals that enterprise security operation centers (SOCs) are looking to extend detection and response into the OT space. However, a lack of employee visibility and knowledge poses significant barriers, according to a study by Trend Micro. According to the study by the Japanese cybersecurity provider, half of the companies now have an SOC that shows a certain degree of ICS/OT (Industrial Control Systems / Operational Technology) transparency. But even among the companies surveyed that have a more comprehensive SOC, only about half (53…

Read more

PLAY Group: Swiss police IT service hacked and data stolen
B2B Cyber ​​Security ShortNews

If the information from the PLAY group is correct, then they claim to have captured 900 GB of data from Xplain, a Swiss IT and software service that supports many Swiss authorities such as the police, law enforcement agencies, customs and border administration, courts and parts of the Army provided with services and software. The first 7 GB are already available for free download on the Darknet. Switzerland is currently being hit by many high-profile attacks. After the attack on Media CH and the NZZ, the Swiss IT service and software provider Xplain has now been hit. As early as May 23.05.2023, XNUMX, the APT group PLAY wants to be successful…

Read more

New regulations of the operational safety regulation
New regulations of the operational safety regulation

New regulations of the Industrial Safety Ordinance (BetrSichV) now stipulate that potential security gaps in the software and the measurement, control and regulation technology (MSR) and their degree of danger must be assessed. Operators of systems that require monitoring such as elevators, tank farms or biogas plants, steam boilers and other pressure vessels are now obliged to identify potential cyber threats. If the operator has not carried out a corresponding risk assessment, there is a defect that can result in penalties. Wolfgang Huber, Regional Director Central Europe at the security specialist Cohesity, explains how companies can meet these legal requirements despite limited resources: "IT teams are already benefiting from their security architecture...

Read more

How ChatGPT will support cybercriminals
How ChatGPT will support cybercriminals

The OpenAI ChatGPT chatbot proves how artificial intelligence and machine learning can directly determine life and everyday life. Advanced IT users will use such tools for their purposes. And with that, unfortunately, cybercriminals too. OpenAI's ChatGPT AI model is based on unsupervised learning. With this ML approach, an AI model is fed with a large data set of unlabeled data. The vast corpus of material of books, articles and websites is based on pre-2021 sources and has no connections to the current internet. But that is already enough to learn the structures of natural language and to deceptively…

Read more

Modern vulnerability management in IT and OT
Modern vulnerability management in IT and OT

The measurement and improvement of IT security has now arrived at many companies and is being pushed forward. The question of OT security, on the other hand, is still a closed book for many companies. OTORIO explains how IT and OT security can be promoted equally and what role vulnerability management and scoring play in this. What are the most efficient risk reduction measures that achieve the most effective risk reduction for a specific facility, process or an entire production facility? However, once the risk reduction measures are implemented and an acceptable residual risk remains, there is still more work to be done. The reason for this is,…

Read more

Proactively identify and eliminate IT blind spots
Proactively identify and eliminate IT blind spots

CrowdStrike Asset Graph helps organizations proactively identify and eliminate attack surface blind spots. It provides a unique view of resources in an IT environment to optimize cyber defense strategies and manage risk. CrowdStrike Holdings, Inc., a leading provider of cloud-based protection for endpoints, workloads, identity and data, has introduced CrowdStrike Asset Graph. It's a new graph database built on CrowdStrike Security Cloud that gives IT and security leaders a 360-degree view of all assets (both managed and unmanaged) and a unique insight...

Read more

KRITIS still in sight one year after Colinial Pipeline & Co.
Tenable news

Tenable sees KRITIS operators exposed to increasing threat potential. Also one year after the severe attack on Colinial Pipeline & Co. with devastating effects. A comment from Tenable. “In the XNUMX months since ransomware attacks struck JBS Foods and Colonial Pipeline, the sad reality is that the threat to critical infrastructure operators has increased rather than decreased. Attackers only care about money - not impact Attackers recognize the impact they can have by influencing these environments and rely on it to launch their attacks with increasing accuracy and frequency...

Read more

Tools for IT forensics after cyber attacks
Tools for IT forensics after cyber attacks

Cyber ​​attacks are a daily occurrence for most companies, and it is usually only a matter of time before data security is breached. That's when forensic tools come into their own, helping investigative teams investigate incidents, secure evidence, and initiate countermeasures. There is no such thing as XNUMX% protection against cyber attacks – this is proven, among other things, by the numerous reports of ransomware attacks and data breaches in the news and daily newspapers. It is therefore important for companies to prepare for emergencies and coordinate processes for…

Read more