News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

This is how employees do not become an insider threat

Cyber ​​criminals are increasingly using phishing campaigns to attack cloud offerings such as Office 365. A compromised account belonging to an insider is worth its weight in gold for them, as it not only allows them to read emails, but also access connected services – and launch further attacks. NTT Ltd. explains how businesses should respond to the threat of phishing. With several million active company users every day, cloud offerings such as Office 365 are becoming increasingly attractive for cybercriminals: They can use the attack techniques and tools developed for several attack targets, i.e. companies. In addition, because of the abundance of data, cloud accounts and the services associated with them are…

Read more

Box: MFA via SMS could also be bypassed by attackers
Box: MFA via SMS could also be bypassed by attackers

Varonis security researchers have discovered a way to bypass multi-factor authentication (MFA) via SMS for Box accounts. Attackers with stolen credentials were able to compromise an organization's Box account and exfiltrate sensitive data without having to access the victim's phone. Security researchers reported this vulnerability to Box on November 3, 2021 via HackerOne, which prompted it to be closed. Just last month, Varonis Thread Labs demonstrated how to bypass Box's TOTP-based MFA. Both gaps make it clear that cloud security, even when using seemingly secure technologies, is never...

Read more

And yearly greets the ransomware...
And yearly greets the ransomware...

Ransomware, supply chain attacks and cyber security for companies of all sizes: Which IT security trends and security issues should CISOs and security managers have on their screens in 2022 and beyond? dr Sebastian Schmerl, Director Security Services EMEA, Security Operations at Arctic Wolf, gives an outlook. Ransomware attacks are extremely lucrative. That is why cyber criminals are constantly developing new and sophisticated attack techniques in order to make a profit and blackmail companies through encryption or data theft. Ransomware attacks have evolved from simply encrypting data and extorting organizations to attacks on the entire supply chain. In addition, the attackers are now also using…

Read more

Security outlook 2022: multifactor authentication on the rise
B2B Cyber ​​Security ShortNews

In its forecasts for 2022, WatchGuard addresses, among other things, the new passwordless Windows authentication as well as rising costs for cyber insurance and (MFA) for remote access to company resources. The IT security experts at WatchGuard once again dealt with various security-related developments that have the potential to cause a stir in 2022. For example, the analysts at the WatchGuard Threat Lab assume that cyber criminals will quickly find ways to bypass the passwordless authentication that Microsoft Windows has proclaimed. At the same time, it is predicted that the rising costs of cyber insurance will lead to the spread of strong multifactor authentication (MFA) for remote access to ...

Read more

Cyber ​​insurance require multifactor authentication
Cyber ​​insurance require multifactor authentication

When companies want to take out cyber insurance, the premium is often based on the existing security technology. Multifactor authentication (MFA) has even become a prerequisite for insurance cover. For many companies, the topic of "cyber insurance" is moving on to the agenda, and relevant offers have been around for a number of years. However, due to the frequency and severity of ransomware attacks, taking out such insurance is no longer as easy as it used to be. Insurers reject insecure IT While the attacks prior to the corona pandemic were primarily focused directly on the internal IT systems at the company headquarters, they are now always ...

Read more

Multi-factor authentication: multiple protection against hackers
Multi-factor authentication: multiple protection against hackers

The high number of attacks in which compromised login data are misused shows that passwords alone are no longer sufficient as a trustworthy identification of legitimate users, but that the use of multi-factor authentication (MFA) has become a fundamental building block for corporate security. MFA requires users to provide convincing proof of their identity in addition to their login credentials. According to Microsoft, MFA can prevent identity-based attacks based on stolen credentials up to 99,9 percent. Even if a user's credentials are compromised, MFA attackers make it extremely difficult to circumvent the authentication requirements. How does multi-factor authentication work? MFA complements the authentication process ...

Read more

BOX.com: Multi-factor authentication has been canceled
B2B Cyber ​​Security ShortNews

The multi-factor authentication of Box.com could be bypassed by attackers. The Varonis research team discovered a way to replace MFA with classic one-factor authentication for box accounts. Box.com joins the long list of cloud providers where MFA vulnerabilities were recently uncovered: The Varonis research team discovered a way to replace MFA with classic one-factor authentication for Box accounts, the authentication -Use apps like Google Authenticator. Attackers with stolen credentials could compromise a company's box account and exfiltrate sensitive data without having to use a one-time password. Box.com vulnerability closed in the meantime Security researchers identified this vulnerability in Box on ...

Read more

Multi-factor authentication Cisco DUO
Multi-factor authentication Cisco DUO

Netzlink expands its security solution portfolio to include Cisco DUO multi-factor authentication. The Braunschweig IT system house Netzlink Informationstechnik GmbH, a long-standing “Cisco Premium Certified Partner”, is expanding its service portfolio with Cisco DUO to include adaptive multi-factor authentication (MFA). The new solution effectively supports companies in reliably protecting the system and data access of employees, for example from the home office, from mobile devices or other external work environments, with additional security features. In addition, the solution facilitates mobile device management (MDM for short, management of mobile devices) in the company and temporarily blocks devices in circulation as soon as compliance and security requirements are violated. Multi-factor authentication of an SSL VPN access The ...

Read more

Microsoft: Security gap in MFA
News B2B Cyber ​​Security

Security researchers have discovered a vulnerability in Microsoft's Zero Outage Multi-Factor Authentication (MFA). Specifically, it is about a faulty implementation of the FIDO2 and WebAuthn support, as Dominik Schürmann and Vincent Breitmos from Cotech want to find out. FIDO2 or WebAuthn is an open standard for secure authentication on websites and online services. Many Internet service providers have already adopted the FIDO standard and thus offer their users more security when logging in. Matching articles on the topic

Read more