News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

BSI issues warning about Kaspersky software!
B2B Cyber ​​Security ShortNews

According to Section 7 of the BSI Act, the Federal Office for Information Security (BSI) warns against the use of virus protection software from the Russian manufacturer Kaspersky. The BSI recommends replacing applications from Kaspersky's virus protection software portfolio with alternative products. Antivirus software, including the associated real-time capable cloud services, has extensive system permissions and, due to the system (at least for updates), must maintain a permanent, encrypted and non-verifiable connection to the manufacturer's servers. Therefore, trust in the reliability and self-protection of a manufacturer as well as his authentic ability to act is crucial for the safe use of such systems. When…

Read more

Cyber ​​attacks in Ukraine by Russian hacker group "Gamaredon"
B2B Cyber ​​Security ShortNews

Even before the current cyber attacks on Ukraine and its KRITIS, there were attacks that were evaluated by Palo Alto Networks Unit 42. According to their findings, the state-supported Russian hacker group "Gamaredon" is behind the attacks. Cybersecurity analysts from Palo Alto Networks' Unit42 team have just released new information about Gamaredon's activities. This is a hacking group that the Ukrainian SSU (Sluzhba bespeky Ukrajiny - Ukrainian Internal Security Service) recently reported is being run by 5 Russian FSB officers. Russian hacking group “Gamaredon” Unit 42 security analysts found…

Read more

Attack on petrol station supplier Oiltanking
Attack on petrol station supplier Oiltanking

Highly vulnerable - that is the expert comment by Max Rahner, Sales Director DACH of the cybersecurity provider Claroty, on the attack on the petrol station supplier Oiltanking and other fuel supply companies such as SEA-Invest in Belgium and Evos in the Netherlands. Last week brought back memories of May 2021, when one of the largest oil pipelines in the USA had to be taken offline as a result of a cyber attack. Even if the consequences of the current attacks on Oiltanking in Germany, SEA-Invest in Belgium and Evos in the Netherlands are not comparable to the incident at Colonial Pipeline,…

Read more

Cyber ​​attacks on European energy companies
Cyber ​​attacks on European energy companies

The series of sensational cyber attacks - primarily with ransomware - does not stop. Just a few days after the BlackCat attack on the gas station supplier Oiltanking, there were cyber attacks on Belgian energy companies and a British food manufacturer. Two comments from cybersecurity experts. Security firm Absolute Software says, "Over the past year, there has been a sharp rise in cyberattacks, particularly using ransomware to target critical infrastructure such as utility and energy companies, government agencies, and organizations that provide services and products to which we leave each other strong. For those,…

Read more

When cyber insurances stop paying in the event of an attack
When the cyber insurance no longer pays in the event of an attack

With cyber threats on the rise, insurance against these risks is becoming increasingly popular. In this way, companies hope to receive support in the forensic processing of a cyber attack as well as financial compensation for the damage caused. Max Rahner, Sales Director DACH of the industrial cybersecurity provider Claroty, on the new standard clauses for cyber insurance. Financial compensation for the damage caused by a cyber attack: These hopes could now get a significant damper. The most important industry association for Europe, Lloyds Market Association (LMA), has adopted new standard clauses for cyber insurance and has agreed on a changed approach to the War Exclusion Clause in connection with cybersecurity damage. Why…

Read more

Isolated air gap networks for KRITIS are vulnerable 
Eset_News

Even isolated networks for KRITIS are not safe from attacks or data theft. ESET researchers are investigating special malicious programs that target so-called "air gap" networks. Critical and sensitive infrastructures must be particularly well protected against hackers. One possibility is the use of so-called "air gap" networks. These are used, for example, in industrial control systems that manage pipelines and power grids or dial-up or SCADA systems that control nuclear centrifuges, among other things. These systems are not directly connected to the internet. This complete isolation of a device or system from the Internet and other networks should ...

Read more

Cybersecurity study of incident-relevant areas of operation
Cybersecurity study of incident-relevant areas of operation

The latest study by the Federal Office for Information Security (BSI) highlights security challenges for operators of industrial automation systems with accident-relevant operating areas. TÜV NORD was commissioned with the creation. In the age of Industry 4.0, systems, machines, products and people are increasingly networked with one another and with one another. This opens up new possibilities, but also brings challenges. In the context of the BSI study "Status Quo: Safety & Security in Incident-Relevant Operating Areas", TÜV NORD investigated what these are in concrete terms in the area of ​​cyber security of industrial automation systems. The aim was to determine the need for action on the basis of the knowledge gathered ...

Read more

KRITIS: Badly protected industrial control systems
KRITIS: Badly protected industrial control systems

Industrial control systems are often inadequately protected against cyber attacks, as security researchers from CloudSEK report. This also applies to companies in the critical infrastructure. A comment from 8com. Countless companies and institutions are under attack by cyber criminals every day - in many cases without them noticing. Attacks from the Internet have increased continuously in recent years and by now every IT manager should know that a stable line of defense against cyber criminals is a duty. Attacks on KRITIS have strong effects The effects a successful attack on companies in the critical infrastructure can have was ...

Read more

New high security network TAPs according to IEC standard 62443

Network TAPs (Test Access Ports) are used for secure and reliable access to network data. TAPs are looped into the network line to be monitored and direct all data traffic without interruption and without packet loss while maintaining the data integrity. TAPs are generally used to forward network traffic to an IPS, IDS, WAF, NDR, network packet broker, analysis system or security tool. The often used and already existing SPAN / mirror port on network switches, on the other hand, is unsuitable for professional purposes. Since it is not immune to compromise, it cannot guarantee unadulterated data export without packet loss. A circumstance that attackers ...

Read more

The number of attacks on EU-KRITIS has doubled
B2B Cyber ​​Security ShortNews

The number of cyber attacks on critical targets (KRITIS) in Europe doubled in 2020. Cyber ​​attacks on critical infrastructures have become more frequent and significantly more expensive in the past year. Ransomware is used particularly often and the attacks increasingly take place in three stages. As already reported at this point, cyber criminals have increasingly targeted companies with critical infrastructure in recent months. This is also proven by the latest figures from the European Union Agency for Cybersecurity (ENISA). According to the authority, there were 2020 noteworthy and malicious attacks against ...

Read more