News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

CrowdStrike Analysis: Failures, Consequences, Prevention  
CrowdStrike analysis: failures, consequences, prevention Image: Bing - AI

The BSI and Bitkom present the results of a joint company survey on the consequences of the IT outage caused by CrowdStrike for German companies. Almost half of the companies affected had to temporarily cease operations. Cancelled flights, failed servers and PCs, companies that had to send their employees home - on July 19, 2024, nothing was working in many places. A faulty update of a cybersecurity solution from the company CrowdStrike had led to numerous IT outages worldwide. The Federal Office for Information Security (BSI) and the…

Read more

Bitterfeld: Ransomware attack cost 2,5 million euros
B2B Cyber ​​Security ShortNews

The cyber attack with ransomware on the Bitterfeld district three years ago shows the inconvenient truth: it took years to rebuild the IT, some data and emails are lost forever, citizens had to accept long service losses and the debacle cost around 2,5 million euros. Three years ago, the Anhalt-Bitterfeld district fell victim to a massive hacker attack that paralyzed the administration for several weeks. The attackers used ransomware to encrypt the systems and demanded a ransom. The district did not pay and the systems had to be laboriously restored. An MDR report shows the whole story...

Read more

Hacker attack on many German chambers of crafts
B2B Cyber ​​Security ShortNews

Currently, most of the websites of the 53 German Chambers of Crafts are not accessible. All of them show the same picture, that they are disrupted due to a system failure. However, individual chambers have already confirmed a hacker attack on the IT service provider. At the moment, it is easy to find out which Chamber of Crafts operates its systems or at least the homepage with the IT service provider ODAV in Straubing, Bavaria. All web addresses are currently redirected to www.hwk-info.de and only show an information banner with the message "Our homepage is currently unavailable!". There is also the information "We are working hard to get our systems up and running...

Read more

IT problem solvers with AI: AI Assistant for Observability
IT problem solvers with AI: AI Assistant for Observability - Image by Faisal Mehmood on Pixabay

Elastic Announces Launch of AI Assistant for Observability and General Availability of Universal Profiling. Transforming the observability of complex cloud-native environments: centralized and limitless end-to-end visibility for site reliability engineers (SREs). Elastic, the company behind Elasticsearch®, announces the launch of the Elastic AI Assistant for Observability and the general availability of Universal Profiling™. This provides Site Reliability Engineers (SREs), regardless of their level of experience, with context-specific, relevant and actionable operational insights into their respective IT environment. Today's IT operations teams face ever-changing system challenges and issues specific to their particular IT environment...

Read more

Large gaps in Detection & Response in the OT area
Large gaps in Detection & Response in the OT area - image by Pete Linforth from Pixabay

A new report reveals that enterprise security operation centers (SOCs) are looking to extend detection and response into the OT space. However, a lack of employee visibility and knowledge poses significant barriers, according to a study by Trend Micro. According to the study by the Japanese cybersecurity provider, half of the companies now have an SOC that shows a certain degree of ICS/OT (Industrial Control Systems / Operational Technology) transparency. But even among the companies surveyed that have a more comprehensive SOC, only about half (53…

Read more

PLAY Group: Swiss police IT service hacked and data stolen
B2B Cyber ​​Security ShortNews

If the information from the PLAY group is correct, then they claim to have captured 900 GB of data from Xplain, a Swiss IT and software service that supports many Swiss authorities such as the police, law enforcement agencies, customs and border administration, courts and parts of the Army provided with services and software. The first 7 GB are already available for free download on the Darknet. Switzerland is currently being hit by many high-profile attacks. After the attack on Media CH and the NZZ, the Swiss IT service and software provider Xplain has now been hit. As early as May 23.05.2023, XNUMX, the APT group PLAY wants to be successful…

Read more

New regulations of the operational safety regulation
New regulations of the operational safety regulation

New regulations of the Industrial Safety Ordinance (BetrSichV) now stipulate that potential security gaps in the software and the measurement, control and regulation technology (MSR) and their degree of danger must be assessed. Operators of systems that require monitoring such as elevators, tank farms or biogas plants, steam boilers and other pressure vessels are now obliged to identify potential cyber threats. If the operator has not carried out a corresponding risk assessment, there is a defect that can result in penalties. Wolfgang Huber, Regional Director Central Europe at the security specialist Cohesity, explains how companies can meet these legal requirements despite limited resources: "IT teams are already benefiting from their security architecture...

Read more

How ChatGPT will support cybercriminals
How ChatGPT will support cybercriminals

The OpenAI ChatGPT chatbot proves how artificial intelligence and machine learning can directly determine life and everyday life. Advanced IT users will use such tools for their purposes. And with that, unfortunately, cybercriminals too. OpenAI's ChatGPT AI model is based on unsupervised learning. With this ML approach, an AI model is fed with a large data set of unlabeled data. The vast corpus of material of books, articles and websites is based on pre-2021 sources and has no connections to the current internet. But that is already enough to learn the structures of natural language and to deceptively…

Read more

Modern vulnerability management in IT and OT
Modern vulnerability management in IT and OT

The measurement and improvement of IT security has now arrived at many companies and is being pushed forward. The question of OT security, on the other hand, is still a closed book for many companies. OTORIO explains how IT and OT security can be promoted equally and what role vulnerability management and scoring play in this. What are the most efficient risk reduction measures that achieve the most effective risk reduction for a specific facility, process or an entire production facility? However, once the risk reduction measures are implemented and an acceptable residual risk remains, there is still more work to be done. The reason for this is,…

Read more

Proactively identify and eliminate IT blind spots
Proactively identify and eliminate IT blind spots

CrowdStrike Asset Graph helps organizations proactively identify and eliminate attack surface blind spots. It provides a unique view of resources in an IT environment to optimize cyber defense strategies and manage risk. CrowdStrike Holdings, Inc., a leading provider of cloud-based protection for endpoints, workloads, identity and data, has introduced CrowdStrike Asset Graph. It's a new graph database built on CrowdStrike Security Cloud that gives IT and security leaders a 360-degree view of all assets (both managed and unmanaged) and a unique insight...

Read more