News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Survey: Platform for network, AI and security desired
Survey: Platform for network, AI and security desired Image: Bing - AI

A survey of 200 CIOs and IT professionals shows that the majority of respondents want a central, integrated platform for networking, AI and security to increase productivity, optimize investments and protect against increasing cyber threats. The new study, entitled CIO Insights Report: Priorities and Investment Plans in the Era of Platformization, was recently published by Extreme Networks. The results show that while AI has caught the attention of the technology industry, the majority of CIOs and IT leaders are in…

Read more

Vulnerabilities in cloud management – ​​access to 50.000 devices 
B2B Cyber ​​Security ShortNews

The security researchers at Team82, the research division of Claroty, have discovered a total of ten vulnerabilities in the Reyee cloud management platform of the Chinese network provider Ruijie Networks. This made it possible for attackers to execute code on any device connected to the cloud and thus control tens of thousands of devices. In addition, the security researchers have developed an attack in which a device in close proximity can be exploited via the cloud to execute arbitrary code on it and gain access to the internal network. The vulnerabilities were reported to the manufacturer, who has since fixed them. Access to tens of thousands of devices...

Read more

Ransomware attacks: 44 percent detected in the network
Ransomware attacks: 44 percent detected in the network Image: Bing - AI

A recent Barracuda analysis for 2023/24 shows that 44 percent of all repelled ransomware attacks were detected during lateral movement within the network. It is also clear that healthcare continues to be the most popular target for attackers. New research shows that lateral movement within a network is the clearest sign of an impending ransomware attack - almost half (44 percent) of identified ransomware attacks were detected in this way, according to a Barracuda study. A quarter (25 percent) of incidents were detected when attackers began creating or editing files....

Read more

Difficult task: network security across multiple locations
Difficult task: Network security across multiple locations - Image by Gerd Altmann on Pixabay

For companies and their security managers, network security at distributed locations is a tricky task. As a Kaspersky report shows, more than every second company sees distributed protection as a major challenge. For decision-makers in companies in Germany, managing and protecting networks that connect multiple locations is an increasing challenge: they see the development of a coherent IT infrastructure (2 percent) and the protection of all information (58 percent) as the greatest challenges. These results emerge from the current Kaspersky report "Managing geographically distributed businesses: challenges and solutions". A connected world brings...

Read more

CRITICISM: OT and IoT network anomalies are ubiquitous 
CRITICISM: OT and IoT network anomalies are omnipresent - Image by Gerd Altmann on Pixabay

A new report shows that network anomalies and attacks are the most common threats to OT and IoT environments, especially in the area of ​​critical infrastructure. Vulnerabilities in critical production areas have increased by 230 percent. Nozomi Networks has released its latest Networks Labs OT & IoT Security Report. The experts' analysis shows that network anomalies and attacks represent the greatest threat to OT and IoT environments. Another reason for concern: vulnerabilities in critical production areas have increased by 230 percent. Therefore, cybercriminals have many more opportunities to access networks and cause these anomalies. Collected telemetry data…

Read more

NDR and machine learning against data exfiltration
NDR and machine learning against data exfiltration

Many companies are unable to effectively prevent data exfiltration and data theft. According to Exeon, the most common causes of such exposure of confidential and private data are cyberattacks and human error. NDR and machine learning are powerful tools against data exfiltration. Only timely detection of vulnerabilities and cyberattacks can prevent data from being exfiltrated and then published by malicious actors or used to obtain ransoms. The increasing complexity of networks and application environments is making it increasingly difficult for companies to reliably prevent exfiltration. Many gateways – mostly because of…

Read more

Industrial CyberSecurity with XDR functions
Industrial CyberSecurity with XDR functions - Image by Sarah Sever on Pixabay

Kaspersky has expanded its Kaspersky Industrial CyberSecurity solution to include automated, centralized compliance audit capabilities. In addition, the platform now has expanded Extended Detection and Response (XDR) and Network Traffic Analysis (NTA) capabilities, as well as a new user interface for easier management. According to Kaspersky ICS CERT, malicious objects were blocked on 2023 percent of computers with an Industrial Control System (ICS) in Germany in the first half of 16. To address the increase and complexity of cyber threats targeting industrial computers, Kaspersky Industrial Security now offers additional features...

Read more

Adversary Report exposes cybercriminals' tricks
Adversary Report exposes cybercriminals' tricks

The detailed analysis of actual attacks on companies uncovers a new scam used by cybercriminals to cover up their length of stay and thus thwart a rapid defensive response. The new Sophos Active Adversary Report reveals the tricks used by cybercriminals. Sophos has released its new Active Adversary Report. Particularly striking: in 42 percent of the attacks analyzed, the telemetric protocols were missing and in 82 percent of these cases, the criminals actively deactivated or deleted telemetry data to hide their attacks. In addition, the length of stay in the hijacked system continues to decrease, setting the trend...

Read more

Qakbot continues to actively defy smashed network
B2B Cyber ​​Security ShortNews

As new threat intelligence findings from Cisco Talos show, the threat actor (affiliates) behind the Qakbot malware remains active and has been running a campaign again since the beginning of August 2023. In the campaign, they spread the ransomware “Ransom Knight” and the backdoor “Remcos” via phishing emails. What's special: the Qakbot infrastructure was confiscated by the FBI at the end of August. Nevertheless, the campaign, which was launched at the beginning of August, continues. This suggests that the law enforcement action may not have impacted the Qakbot operators' spam sending infrastructure, but only their command and control (C2) servers. Qakbot uses other distribution channels…

Read more

IT problem solvers with AI: AI Assistant for Observability
IT problem solvers with AI: AI Assistant for Observability - Image by Faisal Mehmood on Pixabay

Elastic Announces Launch of AI Assistant for Observability and General Availability of Universal Profiling. Transforming the observability of complex cloud-native environments: centralized and limitless end-to-end visibility for site reliability engineers (SREs). Elastic, the company behind Elasticsearch®, announces the launch of the Elastic AI Assistant for Observability and the general availability of Universal Profiling™. This provides Site Reliability Engineers (SREs), regardless of their level of experience, with context-specific, relevant and actionable operational insights into their respective IT environment. Today's IT operations teams face ever-changing system challenges and issues specific to their particular IT environment...

Read more