News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Better protect corporate networks from malware
Better protect corporate networks from malware

Malware attacks are becoming more sophisticated, and as business processes continue to move to the cloud, organizations need to improve their defenses to protect against them. SentinelOne announces the launch of its Cloud Data Security product line and the general availability of the first two products: Threat Detection for Amazon S3 and Threat Detection for NetApp. These products are designed to help companies using Amazon S3 object storage and NetApp file storage to detect and prevent the spread of malware in their cloud environments and corporate networks. The new offerings are part of the Singularity Cloud product family and complement...

Read more

New malware implant threatens industrial companies
New malware implant threatens industrial companies

Companies from the industrial sector in Eastern Europe were attacked by a threat actor with advanced implants and novel malware. Cloud-based data storage services have been used to exfiltrate data and then proliferate malware. Kaspersky has uncovered a series of targeted attacks on industrial companies in Eastern Europe aimed at establishing a persistent channel for data exfiltration. These attacks shared significant similarities with previously studied attacks such as ExCone and DexCone; this suggests the involvement of APT31, also known as Judgment Panda and Zirconium. The attacks used advanced implants that…

Read more

Armed against cyber attacks and data loss
Network backup

The aim of an effective cyber resilience strategy is to ensure that a company's business operations remain secure in the event of cyber attacks or data loss. The concept includes security, IT infrastructure, business processes and business continuity. Cyber ​​resilience is therefore a preventive measure to comprehensively counteract the effects of malware, insider threats, human error as well as software and hardware errors. How cyber resilience works: The four main components 1. Threat protection: Measures against malware attacks and data misuse As technologies advance, so does the number of sophisticated cyber attacks. Viruses, worms, bots, Trojans or keyloggers, common forms of malware not only have a high potential for damage, but are also ...

Read more