News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Special phishing tool breaks through MFA protection for accounts
Special phishing tool breaks MFA protection for accounts - image by Franz Bachinger from Pixabay

Cyber ​​criminals are increasingly using multi-factor authentication (MFA) to hijack executive accounts. That's what IT security experts from Proofpoint found out. They saw an increase of over 100 percent over the past six months in incidents where cybercriminals were able to gain access to the cloud accounts of high-level executives at major companies. More than 100 companies worldwide with a total of over 1,5 million employees are affected. The criminals used EvilProxy for their attacks. This is a phishing tool with a reverse proxy architecture that allows attackers to steal MFA-protected credentials and session cookies. Avoid attackers...

Read more

Identity and Access Management with Dark Web Monitor 
Identity and Access Management with Dark Web Monitor

Stolen or leaked credentials lead cyber attackers into the corporate network without any hurdles. WatchGuard strengthens its identity and access management with additional functions such as a password manager and a dark web monitor service for improved implementation of zero trust policies. With the recently presented "AuthPoint Total Identity Security" bundle, WatchGuard Technologies is expanding its offering in the area of ​​identity and access management in a targeted manner. The new service package expands the already established multi-factor authentication (MFA) "WatchGuard AuthPoint" with a dark web monitor service and a suitable password manager. Through the coordinated interaction of these functionalities along the risk-based zero trust policies of the WatchGuard Unified Security Platform architecture, managed...

Read more

Cloud: Sticking to passwords despite security risks
Cloud: Sticking to passwords despite security risks

A new industry study reveals that half of cloud professionals surveyed are frustrated with password hygiene requirements. But the experts want to stick to the passwords, although there are secure alternatives with MFA. A survey at Cloud Expo Europe provides information. Even most cloud professionals still cling to the use of passwords, despite their well-known security vulnerabilities, their value as a target for cybercriminals, and widespread user frustration with the complexity of proper password management. That's according to a new industry study...

Read more

Countdown to NIS2 Policy
B2B Cyber ​​Security ShortNews

The new NIS2 directive aims to improve internal cybersecurity measures while also promoting collaboration between companies and within the EU. The EU member states now have until October 17 of this year to incorporate the measures into national legislation. Like the NIS directive that preceded it, NIS2 does not specify which technological changes must be made explicitly. Rather, abstract ideas and concepts for improving the security situation are outlined. It is clear that NIS2 will affect a large number of companies operating in the EU. It is unclear, however, what effects the directive...

Read more

Minimize the risk of phishing
Minimize the risk of phishing

Hardly a month goes by without warnings about new phishing attacks. Phishing remains one of the top cyber threats. With eight central measures, companies can significantly minimize the risk of attack. Attackers' phishing methods are becoming more and more sophisticated using the latest technologies. The fact that more and more employees are working on the go or from their home office and are sometimes switching between company and private devices also plays into the hands of the attackers. In addition, hackers benefit from three developments in particular: Employees are spending more and more time of their private lives online, making it easy for attackers to...

Read more

How to Avoid MFA Fatigue Attacks?
How to Avoid MFA Fatigue Attacks?

Phishing attacks are currently one of the greatest cyber threats. New variants can be observed almost every day. At the moment, there are more and more MFA fatigue attacks, as the hacker attack on the transport service provider Uber shows. CyberArk Labs have identified five common recent phishing attacks: MFA Fatigue Attacks Using SMS and voice phishing to impersonate trusted sources, attackers “tire” users with multiple MFA pushes before gaining access to the target systems. Attackers are always finding new ways to bypass MFA applications and security controls. The use of phishing-resistant MFA factors such as FIDO, QR codes or…

Read more

Check: US Department of the Interior cracks 18.000 internal passwords
Check: US Department of the Interior cracks 18.000 internal passwords

The US Department of the Interior (DOI) checked almost 86.000 US government passwords during a security check. Over 18.000 were cracked, almost 14.000 of them in just 90 minutes. 362 High-level employee accounts are extremely insecure. Many media keep reporting that private users use passwords that are too simple, such as 12345 or Password123. While experts continue to find it hard to believe, there is now evidence that these passwords were even used within the US government. This is confirmed by the internal security check of the American Department of the Interior - DOI - Department of the...

Read more

Business logins: Almost 60 percent use names and passwords
Business logins: Almost 60 percent use names and passwords

A global Yubico survey shows that 59% of employees still rely on name and passwords as the primary method of authenticating their accounts. The study reveals some startling results for enterprise authentication in 2022. In light of the recent phishing attacks, Yubico, the leading provider of hardware security keys, has presented the results of its first survey on the state of global enterprise authentication in 2022. The survey, conducted by Censuswide on behalf of Yubico, asked more than 16.000 employees at a variety of companies in eight countries, including Germany, about their perceptions and...

Read more

Zero Trust: Promotion with hardware security keys for MFA
Zero Trust: Promotion with hardware security keys for MFA

Cloudflare makes hardware security keys more accessible than ever to millions of customers and increases security with MFA. An exclusive offer has been created in collaboration with Yubico to end phishing attacks once and for all. Cloudflare, Inc. is the security, performance and reliability specialist dedicated to creating a better Internet. The company presents a new offering that makes physical security keys the most accessible and economical solution for customers to better protect their business and employees. Cloudflare customers can use security keys from Yubico, the leading provider of hardware security keys and thus the…

Read more