News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Data on the Darknet: ALPHV hacks US defense company Ultra  
B2B Cyber ​​Security ShortNews

Most recently, BlackCat fought with the FBI with ALPHV - now the APT group has landed a new hack: The US company Ultra I&C, which supplies Switzerland, NATO and many other countries with military equipment and cybersecurity, is said to have lost 30 GB of data have them available for download on the dark web. There is currently no official statement from Ultra I&C (Ultra Intelligence & Communications) on the hack by the Russian APT group BlackCat with the ransomware ALPHV, but other bodies, such as the Swiss Army, have. The Federal Department of Defense and Civil Protection…

Read more

APT: TA473 attacks NATO allies, officials and structures
B2B Cyber ​​Security ShortNews

Proofpoint's security experts have uncovered a new cyber campaign that is particularly targeting NATO allies. The TA473 hacker group, an Advanced Persistent Threat (APT) actor, is using an IT vulnerability called "Zimbra vulnerability" (CVE-2022-27926) for its current campaign. The target of their attacks are publicly accessible webmail portals hosted by Zimbra (the Zimbra Collaboration Suite is an e-mail and groupware solution). As part of their activities, the attackers attempt to gain access to e-mails related to the war between Russia and Ukraine from military, governmental and diplomatic organizations in Europe. The APT group TA473 is also…

Read more

Russian threat actors target NATO countries like USA
B2B Cyber ​​Security ShortNews

Since early 2022, the Microsoft Threat Intelligence Center (MSTIC) has been monitoring SEABORGIUM phishing campaigns targeting over 30 organizations, primarily NATO countries, particularly the US and UK with occasional attacks on other Baltic, Nordic and Eastern European countries Countries. The Microsoft Threat Intelligence Center (MSTIC) monitored SEABORGIUM campaigns and took action to disrupt them. SEABORGIUM is a Russian-born threat actor whose goals and victimology closely align with the interests of the Russian state. Its campaigns include persistent phishing and credential theft campaigns. The intrusion of…

Read more

Russian hackers attack NATO detachments
B2B Cyber ​​Security ShortNews

Google Threat Analysis Group published a post titled “Tracking cyber activity in Eastern Europe”. In it, the Google experts describe how Russian hackers carried out very targeted phishing attacks on a NATO competence center. The group COLDRIVER should be responsible for it. The group COLDRIVER, a Russia-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns targeting several US-based NGOs and think tanks, a Balkan country's military and a Ukraine-based defense company. The group was recognized years ago by F-Secure experts (now WithSecure) in their…

Read more

BSI updates German cyber security situation after Russian attack
B2B Cyber ​​Security ShortNews

In view of the situation in Ukraine, the Federal Office for Information Security (BSI) continuously assesses the situation related to information security. It also assesses the cyber security situation in Germany. Furthermore, the BSI recognizes an abstractly increased threat situation for Germany. For the BSI, however, there is currently no acute immediate threat to information security in Germany in connection with the situation in Ukraine. According to the BSI, this rating can change at any time. Continued increased danger for Germany The BSI therefore continues to call on companies, organizations and authorities to...

Read more

Cyber ​​threats before the start of war: what can be learned from them?
Cyber ​​threats before the start of war: what can be learned from them?

Prior to the Russian attack on Ukraine, there were a number of cyber threats: Distributed Denial of Service (DDoS) attacks that sporadically disrupted Ukrainian government websites and financial services providers. What can we learn from history to be prepared? A timeline from 2007 to 2022. A commentary by Chester Wisniewski, Principal Research Scientist at Sophos. “All companies should always be prepared for attacks from all directions. But it can be helpful to know what to look for when the risk of an attack increases. I decided to tell the story of the well-known…

Read more

Cyber ​​warfare: critical infrastructure in the crosshairs
Cyber ​​warfare: critical infrastructure in the crosshairs

Not only the recent cyber attacks on critical infrastructures - energy, logistics, telecommunications - have shown how vulnerable many organizations and their infrastructures are. It becomes particularly critical when attacks affect both IT (information technology - PCs, servers, etc.) and OT (operating technology - machines, etc.). Daniel Bren, the CEO and co-founder of OTORIO, is a well-founded expert on the subject. As a former IT security chief of the Israeli army and today's entrepreneur, he knows many aspects of the problem: "In 1997, the US Department of Defense (DoD) conducted the first "cyber war games" under the operation "Eligible Receiver"...

Read more