News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

After the LockBit blow: What about ransomware attacks?

In a current report, Trend Micro analyzes the ransomware landscape and provides an outlook on the impact the interruption of LockBit activities has on it. LockBit was not completely broken up, but its activity was severely suppressed and new malicious code developments were discovered and thus rendered unusable. In collaboration with the British National Crime Agency (NCA), Trend Micro was able to provide detailed analyzes of the ransomware group's activities and permanently disrupt the entire functionality of the malware. Since 2022, LockBit and BlackCat have consistently been among the Ransomware-as-a-Service (RaaS) providers with the most discoveries. Globally you can...

Read more

Security Operations Platform with Threat Center and Copilot
Security Operations Platform with Threat Center and Copilot - Image by Vilius Kukanauskas on Pixabay

Exabeam's Security Operations Platform gets two new key cybersecurity features: Threat Center and Copilot. The solution combines threat management, investigation tools and automation with a generative AI model. Threat Center is the first combination in the market to provide a unified threat detection, investigation and response (TDIR) workbench that simplifies and centralizes security analyst workflows. The Copilot feature uses generative AI to help analysts quickly understand active threats and provide best practices for rapid response. These innovations shorten…

Read more

New danger: AI DarkGemini fulfills hackers' wishes
B2B Cyber ​​Security ShortNews

In addition to Google's AI Gemini, DarkGemini has now appeared and fulfills the wishes of cyber gangsters and malware writers. The first editions are not yet particularly good, according to some security researchers. But neither were other AI services at the beginning. The development continues dangerously. When ChatGPT was opened at the end of 2022 and introduced to the world, it didn't take long for the first reports of the misuse of the GenKI tool to make the rounds. A year later, the first AI tools that could be used by cybercriminals were leaked, namely FraudGPT, WormGPT and Co. All programs that...

Read more

The AI ​​Act and its consequences for data protection
The AI ​​Act and its consequences

The AI ​​Act is the first law for AI and gives manufacturers of AI applications between six months and three years to adapt to the new rules. Anyone who wants to use AI in sensitive areas will have to strictly control the AI ​​data and its quality and create transparency - classic core disciplines from data management. The EU has done pioneering work and, with the AI ​​Act, has regulated what is currently the most dynamic and important branch of the data industry, just as it did with the GDPR in April 2016 and the Digital Operational Resilience (DORA) in January of this...

Read more

AI on Enterprise Storage fights ransomware in real time
AI on Enterprise Storage Fights Ransomware in Real-Time - AI - Bing

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware in real time. The new features ensure that both primary and secondary data in the company is protected from ransomware - regardless of their location on-premises or in the cloud. The number of ransomware victims has increased by 90 percent, with Germany in fourth place behind the USA, Canada and Great Britain. Critical infrastructure and supply chains are particularly frequently attacked. Therefore, according to the NetApp 2023 Data Complexity Report...

Read more

AI cost driver
AI cost driver

Companies are increasingly using artificial intelligence to optimize their operational efficiency and product innovation. A recent survey shows that 40 percent of companies surveyed want to increase their investments in AI technologies due to rapid advances in generative AI. However, a downside to its increasing use is that AI - particularly generative AI - is computationally intensive and costs increase with the amount of data on which the AI ​​models are trained. There are three main reasons why AI can quickly become a cost driver without proper control: AI consumes additional resources: Execution...

Read more

AI is revolutionizing access management
AI is revolutionizing access management

Many companies are currently considering using artificial intelligence (AI) for identity management. The technology not only allows users to monitor suspicious behavior more effectively and automatically, but also improves security systems. In the study “The State of Identity Governance 2024,” almost 53 percent of the 567 IT experts and executives surveyed said that functions supporting AI in identity and access management, for example, were among the top five priorities when evaluating such a solution. More and more IT administrators are coming to the conclusion that with many traditional IGA (Identity Governance and Administration) systems…

Read more

Immutable memory protects against attacks
Immutable memory protects against attacks

A survey of cybersecurity experts from companies with more than 1.000 employees confirms that 46 percent of respondents believe that generative AI increases their company's vulnerability to attacks. This trend appears to be already well underway, with 75 percent of respondents confirming that they are seeing an increase in attacks compared to last year - 85 percent attributing this increase to the use of generative AI by cybercriminals. With generative AI, cyber fraudsters have even more options to adapt flexibly, use complex tactics to circumvent traditional data protection solutions and...

Read more

Dangers of software supply chains
B2B Cyber ​​Security ShortNews

The software landscape continues to grow, and so it is not surprising that the vulnerabilities and attack surfaces of software libraries are not getting smaller. Software supply chain attacks are particularly attractive to threat actors because, if successful, they can gain access to hundreds or thousands of applications with just one attack. Exploiting vulnerabilities or compromising source code in trusted applications can allow an attacker to operate from a central location and move around the network undetected. Various solutions to this danger vector are being researched, a…

Read more

January 28, 2024: European Data Protection Day
January 28, 2024: European Data Protection Day - KI MS

January 28, 2024 is European Data Protection Day. In this context, it is important to raise awareness of privacy and data protection and to raise awareness of relevant IT security issues - regardless of whether they concern the private or corporate environment. Advances in artificial intelligence (AI) and machine learning (ML) are an obvious theme on Data Protection Day 2024 - both because of the potential benefits that such tools bring with them and because of the dangers that come with them, which are certainly cause for concern care for. According to Carla Roncato, Vice President of Identity, WatchGuard Technologies. AI…

Read more