News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Google Chrome: Update closes 20 vulnerabilities
B2B Cyber ​​Security ShortNews

Many highly dangerous vulnerabilities have again been found via Chrome's bug bounty program. The current Chrome update to version 115.0.5790.98/99 closes 20 vulnerabilities - 4 of which are classified as "highly dangerous" The current Chrome update contains a total of 20 updates, including 4 updates for highly dangerous vulnerabilities. In companies, the admins ensure that Chrome remains up to date. Individual companies and SMEs should definitely click in the help area - the further update happens automatically. Work PCs often run through and as long as the browser is not closed and reopened, no update happens! Chrome version 115.0.5790.98/99 closes gaps…

Read more

3CX: 3CX Desktop App Security Incident Results
B2B Cyber ​​Security ShortNews

3XC, the provider of the popular Phone System VOIP/PBX software, had an issue with a trojanized version of the 3CX desktop app. With 600.000 customers in 190 countries waiting for answers, 3CX employed specialist Mandiant as the investigation team for the forensic analysis. Now the first findings are available that it is probably a North Korean APT group. Based on Mandiant's previous investigation into the 3CX intrusion and supply chain attack, they assign the activity to a cluster called UNC4736. Mandiant believes with a high degree of certainty that UNC4736 has a North Korean connection. Windows-based malware client…

Read more

Mac spyware CloudMensis spies and steals data  
Eset_News

CloudMensis: Mac spyware is popular with cybercriminals. After DazzleSpy (January 2022) and Gimmick (March 2022), ESET researchers have uncovered the third high-risk spy malware. The previously unknown spyware, dubbed CloudMensis by ESET, has been extensively spying on infected Apple computers since February 2022. Documents and keystrokes are recorded, e-mail messages and attachments are saved, files are copied from removable media and screen recordings are made. Cloud storage services such as Dropbox, pCloud and Yandex Disk are of particular importance: They serve both as a communication medium between victim and attacker and as storage for further malware and the captured…

Read more

Jamf Security Report for 2021
Jamf Security Report for 2021

Jamf's new 2021 Security Report has some insights: Compromised mobile devices are accessing critical applications, smishing and Mac malware are on the rise, the human factor remains a major threat to IT security. Jamf today announces its annual security report. It makes it clear that companies are confronted with increasing challenges in IT security: These include an increasingly mobile workforce, new strategies and goals of hackers and the persistent "human" vulnerability. Among other things, Jamf found that six percent of companies recorded a malware installation on a mobile device in 2021. Every…

Read more

In the laboratory test: security solutions for MacOS BigSur 
AV TEST News

In September & October 2021, the independent institute AV-TEST tested 3 security solutions for companies and 10 single-user versions under MacOS BigSur for their protective effect, system load and false alarms. All products were tested for 2 months in the laboratory under realistic conditions. The laboratory awarded up to 6 points for each test area. A product can achieve a maximum of 18 points in the test. All Mac BigSur corporate solutions with the maximum number of points The products Bitdefender Endpoint Security for Mac, FireEye Endpoint Security and Symantec Endpoint Security Complete were each able to finish the test with the maximum number of points. Get for it ...

Read more

Mac hack via Office macros
News B2B Cyber ​​Security

Der Spiegel (spiegel.de) reports how a recent Mac hack shows how easily the Office package can be attacked on a Mac and thus also endanger companies - even if Office runs more under Windows there. Mac hacker Patrick Wardle has now presented his experiment in the virtual edition of the Black Hat IT security conference, which normally takes place every summer in Las Vegas. His attack on the Mac is actually a classic of the Windows hacks - namely the spread of malware via prepared office macros. The hack Wardle shows the black hat audience does not trigger a macro warning. He…

Read more

Trojans hide in Mac software
Eset_News

ESET researchers analyze malware in trading programs for cryptocurrencies That Mac users are not the target of malware attacks and that cyber criminals have long been considered a wives' tale among experts. ESET researchers have once again uncovered and analyzed cybercrime activities targeting the macOS operating system. The Slovak IT security experts discovered manipulated crypto trading software on fake provider websites. The programs are all clones of a legitimate application that the malicious code distributors have provided with GMERA malware. For this purpose, the criminals misused the well-known Kattana trading software, renamed it and integrated the malware into their installation program. In addition, copied ...

Read more