News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Linux systems targeted by ransomware attackers
B2B Cyber ​​Security ShortNews

Attacks on Linux systems have been increasing for several years. A provider of security solutions therefore conducted a study analyzing and comparing ransomware attacks on Linux and Windows. Ransomware attacks on Linux systems, particularly ESXi systems, have increased significantly in recent years. That's why Check Point Research (CPR) delves into the intricacies of these incidents and draws comparisons to their Windows counterparts. Historically, ransomware threats have primarily targeted Windows environments. The malware, which aims to encrypt the data of its victims, which the attackers then usually only exchange for large ransoms...

Read more

UEM solution: Improved security for endpoints
Improved security for endpoints

A remote maintenance tool is included in the new version of the baramundi Management Suite, which increases the security of end devices. Also Android Zero Touch, Linux inventory and new features for Argus Experience. In November, baramundi software GmbH announced the new release of its baramundi Management Suite (bMS) 2023 R2. The Unified Endpoint Management (UEM) solution has received the following improvements and expansions: New “Remote Desk” module – remote maintenance for end devices The development of the past few years has shown: Home office and mobile work are here to stay: One A significant portion of daily work is no longer...

Read more

Malware in the manufacturer's package: attacks on Linux systems
Kaspersky_news

The free “Free Download Manager” distributed a backdoor Trojan to Linux operating systems for at least three years. A supply chain attack is suspected. Sensitive user data was also accessed. Kaspersky has discovered a new malicious campaign targeting Linux. Once a system is infected, attackers can steal sensitive information such as system details, browsing history, saved passwords, cryptocurrency wallet files, and even login credentials for cloud services such as Amazon Web Services or Google Cloud. Infection when downloading from the official manufacturer's website According to Kaspersky analyses, the attacks with the infiltrated application file on Linux systems took place over at least...

Read more