News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Report: IT leaders believe XDR is necessary
Report: IT leaders believe XDR is necessary

A new study underscores the uncertainty surrounding XDR definition, implementation and required resources. The ExtraHop report shows that 78 percent of the IT managers surveyed consider the topic of XDR to be necessary, despite irritation. ExtraHop has released the results of the study "To Achieve the Promise of XDR, Look Beyond the Endpoint" examining the adoption of Extended Detection and Response (XDR) in organizations. The global study highlights the successes, obstacles, challenges and hesitations of companies that have developed or are considering an XDR strategy. Despite the uncertainty, nearly a third of...

Read more

Largest DDoS attack ever on Cloudflare network
B2B Cyber ​​Security ShortNews

Cyber ​​security company Cloudflare has detected and repelled dozens of DDoS attacks. Most attacks peaked at between 50 and 70 million requests per second (rps), with the largest attack exceeding 71 million rps. A few weeks ago, strangers attacked Cloudflare's network. However, the CDN provider was able to fend off the DDoS attack without further failures and redirected the requests to its large scrubbing center. These can easily record and analyze the attacks and sort out and block the malicious requests. However, normal requests to a page are forwarded. DDoS as a standard weapon DDoS is one of the oldest…

Read more

Security solution with next-gen zero-trust network access
B2B Cyber ​​Security ShortNews

Keeper Security, provider of zero trust cyber security solutions, releases the latest update of its Keeper Connection Manager (KCM). This now enables DevOps and IT teams to access RDP, SSH, database and Kubernetes endpoints directly via web browsers. With this new functionality, companies can grant their administrators the exact access to databases and tables they need to perform their jobs. For temporary access, the Keeper Connection Manager offers a quick and easy solution - unlike installing client-side software. Easy access also via browser The administrators only have to…

Read more

Firewall Xstream power for SMEs and Enterprise
SophosNews

More protection for SMBs and Enterprises with the Xstream architecture. The new Sophos Firewall comes with performance improvements, dynamic traffic routing and SD-WAN capabilities, and integrations with Microsoft Azure Active Directory. Sophos introduces the new capabilities of the Sophos Firewall. The latest version is optimized for the complex and demanding requirements of distributed enterprise edge computing while also providing practical extensions for SMBs. These include, in particular, performance improvements when checking encrypted data traffic, dynamic traffic routing for the Internet Protocol Version 6 (IPv6), additional reliability with software-defined wide area network (SD-WAN) load balancing...

Read more

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

Emotet campaign picks up steam again
B2B Cyber ​​Security ShortNews

TA542, a cybercriminal group that distributes Emotet malware, has ended its summer break and is launching more and more new campaigns. However, also with modified Emotet variants. Group TA542 was absent for almost four months and was last seen in action in the summer of July 13, 2022. Since November 2, Proofpoint's security specialists have been monitoring new activities by TA542 - especially in Germany. Key learnings about the Emotet campaigns TA542 uses customized Emotet variants in the new campaigns. The changes (see below) affect the payloads and lures used as well as changes to...

Read more

Is 5G a security risk for OT?
Is 5G a security risk for OT?

5G: Until recently, OT (Operational Technology) infrastructures were designed as isolated, shielded environments, disconnected from the corporate network - with the result that cybersecurity has not received much attention. With the advancement of an ever more networked factory, the Industrial Internet of Things (IIoT) and the latest 5G mobile communications standard, companies can no longer avoid implementing security concepts for their production facilities that are equivalent to those they already do in the classic IT environment. In principle, the integration of new technologies always entails potential security risks. Private 5G is safe - isn't it?...

Read more

IoT security cameras: a found fodder for hackers
IoT security cameras: a found fodder for hackers

IoT security cameras are connected to both the company network and the Internet, and transmit large amounts of data to recording systems in the company or in the cloud. Implementation should be rigorously planned and ongoing monitoring implemented. Since these points are often neglected, IoT security cameras are often a target for hackers. Internet-connected security cameras can be found everywhere these days - in public institutions, businesses and even in homes. The market is estimated to be around $2021 billion in 50 and is growing rapidly. Every day, hundreds of thousands of IoT security cameras are deployed worldwide...

Read more

Study Identity Security: Still neglected technology
Study Identity Security: Still neglected technology

SailPoint presents The Horizons of Identity study, which examines the maturity of identity programs in organizations. New data shows that despite the growing threat of identity-based attacks, nearly half of organizations are just beginning to embrace identity security. SailPoint Technologies Holdings, Inc., the leader in enterprise identity security, today announced the findings of a new research report titled "The Horizons of Identity." At a time when hyper-innovation and rapid technology development have become the engine for global businesses, mature identity programs are becoming a…

Read more

Threat Hunting Report: One attack every 7 minutes
Threat Hunting Report: One attack every 7 minutes

CrowdStrike's annual threat hunting report shows that cybercrime actors are not taking a break. The report shows that a potential cyber attack is identified every seven minutes. The breakout time for eCrime actors has also fallen. CrowdStrike, a leading provider of cloud-based protection for endpoints, cloud workloads, identity and data, today released its fourth annual threat hunting report Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report. The global report reveals a record-breaking 50 percent year-over-year increase in hands-on attack attempts, along with significant shifts in attack trends and tactics...

Read more