News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​defense with AI: 3 out of 4 companies already use it 
Cyber ​​defense with AI: 3 out of 4 companies already rely on it Image: depositphotos

AI is already at the forefront of cyber defense: 74 percent of German companies are already using AI in cyber defense. A study demonstrates the growing importance of AI for cybersecurity strategies, but at the same time, concerns about cyber risks are increasing. These new study results show that companies are increasingly turning to artificial intelligence (AI) to strengthen their cyber defenses, but are also increasingly expressing concern about this technology's potential to expand their attack surface and create new risks. Defense with AI: 74 percent of German companies use it. According to the Trend Micro study, 74 percent…

Read more

Agentic AI: Danger from autonomous AI-based cyberattacks
Agentic AI: Danger from autonomous AI-based cyberattacks

Agentic AI is capable of autonomously executing cyberattacks from start to finish. These autonomous, self-learning AI systems can plan, execute, and adapt attacks in real time without human intervention. This illustrates how dramatically the threat potential is changing with the use of AI—in speed, scope, and sophistication. The speed at which AI technologies are evolving is expanding the capabilities of attackers—and security providers—every day. Agentic AI is entering a new chapter: These systems operate persistently, adaptively, and with an efficiency that overwhelms conventional defense strategies. Unit 42 will be developing its new framework…

Read more

Business boom with malicious AI models on the darknet

Business with malicious AI models on the dark web is in full swing. A new report sheds light on illegal activities involving artificial intelligence. These include: hacker GPTs, AI-as-a-service, data poisoning, and deepfakes. The new AI Security Report has been published. In it, security researchers at CPR examine how artificial intelligence is changing the cyber threat landscape – from generative AI models (GPTs) built specifically for hackers on the dark web, to deepfake attacks, data poisoning, and account trading, to the instrumentalization of generative AI models for cyberattacks and ransomware in general. Key findings from the AI ​​Security Report: AI use in companies: 51 percent of all…

Read more

New protection solution is prepared for AI agents
New protection solution is prepared for AI agents Image: depositphotos

The new enterprise protection solution offers protection against multi-stage attacks across multiple digital channels, identity theft protection, and risk-based policies and employee training. Proofpoint Prime aims to increase long-term resilience against emerging attacks and reduce cyber risk and operational costs for organizations. Organizations rely on an overwhelming array of fragmented, siloed, and reactive cybersecurity tools. Against this backdrop, Proofpoint Prime offers the industry's only integrated solution that combines threat prevention and human risk management into seamless workflows that span the entire attack chain. Proofpoint Prime combines real-time threat detection and response with behavior-based policies…

Read more

With NVIDIA: AI security platform for cloud and on-premises
With NVIDIA: AI security platform for cloud and on-premises Image: depositphotos

To enable companies worldwide to securely transform their business processes using modern AI infrastructures, Trend Micro is integrating powerful security features into the NVIDIA Enterprise AI Factory reference design. The Japanese cybersecurity provider is thus supporting companies worldwide in securely transforming their business processes using modern AI infrastructures. The Trend Vision One enterprise cybersecurity platform provides consistent security policies across on-premises infrastructures, hybrid solutions, and the cloud – seamlessly and centrally manageable. Trend is thus optimally positioned to meet the security requirements of globally operating companies. As more and more companies choose to build their own AI infrastructures, a flexible security solution that supports every…

Read more

Phishing Report: Criminals rely on AI
Phishing Report: Criminals rely on AI

A recent report shows that attackers have changed their phishing tactics. They are using AI to target IT, HR, finance teams, and payroll departments. The most popular platforms for stealing identity data are Facebook, Instagram, and Telegram. Globally, phishing attacks have decreased by one-fifth. Zscaler, a leading provider of cloud security, released its Zscaler ThreatLabz 2025 Phishing Report, which analyzed over two billion blocked phishing attempts from the Zscaler Zero Trust Exchange™ platform between January and December 2024. The annual report reveals that cybercriminals are increasingly turning to generative AI to launch targeted attacks against critical business functions...

Read more

Anti-Deepfake: New technology detects fake AI voices
Now the end comes for telephone fraudsters

Telephone fraudsters who use fake AI voices, such as those in the "grandparent scam," are often successful in stealing their victims' assets. AI researchers at TU Darmstadt have now developed a technology – VoiceRadar – that exposes AI on the telephone. A German IT security company is the first to use VoiceRadar. Fraud using fake AI voices on the telephone is becoming increasingly difficult to combat. Now TU Darmstadt, globally recognized for its expertise in IT security, has achieved a technological breakthrough to put a stop to telephone fraud. The people responsible for this are Prof. Dr. Ahmad-Reza Sadeghi, Professor of Cybersecurity at TU Darmstadt, and…

Read more

Automotive industry: billions in damages from cyberattacks
Automotive industry: billions in damages from cyberattacks

A recent cybersecurity report for the automotive industry reveals serious trends and security deficiencies, despite promising successes by law enforcement agencies in the field of cybersecurity last year. The report also provides actionable insights – demonstrating the value of proactive and comprehensive cybersecurity in the age of (auto)mobile transformation. These are the trends from the VicOne 2025 Automotive Cybersecurity Report, titled "Shifting Gears": Cyberattacks in the automotive industry caused an estimated multi-billion euro loss through ransomware, data breaches, and business interruptions in the last two years (2022-2024). Security vulnerabilities in the automotive industry reached...

Read more

Automated recovery from ransomware attacks
Automated recovery from ransomware attacks

The new intelligent backup feature "Ransomware Remediation" offers reliable recovery of encrypted files in the event of a ransomware attack. This is just one of the new enhancements to the ESET security platform. AI-assisted security has also been improved. The IT security manufacturer ESET has expanded its Ransomware Shield with the intelligent backup solution Ransomware Remediation, which enables secure recovery of affected data in the event of an attack. A key advantage: Unlike conventional backup methods based on the so-called "Windows Volume Shadow Copy," ESET's solution cannot be tampered with or deleted by attackers. The backups are stored in a protected storage area,...

Read more

AI security features check LLM for vulnerabilities 
AI security features check LLM for vulnerabilities Image: Bing - AI

Qualys now offers TotalAI, a new platform for protecting against risks posed by AI and LLM models from development to deployment. New enhancements strengthen AI security capabilities with expanded threat coverage, multimodal protections, and an internal LLM scanner. The new updates to TotalAI ensure that companies' entire MLOps pipeline is protected from development to deployment. Companies can now quickly test their Large Language Models (LLMs)—even during development cycles—and benefit from stronger protection against more attacks and on-premises scans powered by an internal LLM scanner.

Read more