News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Industry in Europe: Ransomware hits OT almost as often as IT 
Industry in Europe: Ransomware hits OT almost as often as IT

In Europe, ransomware hits industrial control systems and operating technology almost as often as IT systems. Significant disruption in every second victim. Claroty initiated study The Global State of Industrial Cybersecurity 2021: Resilience Amid Disruption. Ransomware is also increasingly becoming a problem for industrial systems and critical infrastructure: 80 percent of KRITIS operators and companies that make a significant contribution to critical infrastructure fell victim to a ransomware attack last year. This is the conclusion of the study "The Global State of Industrial...

Read more

Webinar February 22, 2022: Smart cyber security for smart buildings
B2B Cyber ​​Security ShortNews

Fortinet experts invite you to the free webinar “Expert's View Secure Smart Buildings” on February 22, 2022 at 14:00 p.m. Rapid growth of IoT/IIoT devices is being recorded in building control systems. And here, too, cyber security counts from the start. Modern buildings offer more than just a comfortable place to produce, work, live or play. In order to provide the occupants of buildings with a safe and cost-effective environment, they have become part of a new environment that combines people, technology, lifestyle and sustainability. Smart cyber security for smart buildings Since the efficiency of buildings also has a…

Read more

Ransomware leaks published with sensitive OT information

Mandiant has collected and analyzed datasets stolen from ransomware extortion attacks and published on the dark web. The experts found out that about every seventh leak of data from an industrial company discloses potentially sensitive OT (operational technology = industrial IT) information. The analysis examined about 70 leaks and terabytes of data over several months. Mandiant summarized the results in a report. The following finds stand out Administrator credentials for an OEM; Backups of Siemens TIA Portal PLC project files etc. from a freight and passenger train manufacturer A list of names, emails,…

Read more

Ransomware: Backup alone is not a security strategy
Ransomware: Backup alone is not a security strategy

Many companies think their data backup protects them against ransomware. The enticingly simple logic behind it: If you can restore all the data, you are not open to blackmail. By Ali Carl Gülerman, CEO and General Manager, Radar Cyber ​​Security. However, this is too short-sighted: Even if the system was successfully restored after an attack, sensitive information such as customer data or intellectual property could have been stolen. In addition, the risk of attack remains: Hackers can still be in the network or gain access again by installing a back door. In some cases, ransomware is used by cybercriminals as a red herring, ...

Read more

Mandiant: Cyber ​​security forecasts for 2022

Mandiant publishes its report "14 Cyber ​​Security Predictions for 2022 and Beyond," which predicts the biggest cyber threats for years to come. Those forecasts were made on the basis of current knowledge and trends. The past two years have been shaped by the pandemic. Remote work is still changing the attack surface of many companies significantly. In addition, groups of hackers are constantly evolving, learning from their mistakes and changing their tactics, techniques and procedures. It is all the more important to keep an eye on developments, always be one step ahead of the attackers and open ...

Read more

250. Industrial Cybersecurity - ICS vulnerability identified
B2B Cyber ​​Security ShortNews

Team82, Claroty's research department, identified the 250th ICS vulnerability and took stock: the majority of the vulnerabilities enable execution of unauthorized code and can be exploited remotely. Just over two years after its inception, Team82, the research division of industrial cybersecurity specialist Claroty, published its 250th critical vulnerability in industrial control systems (ICS). Critical weak points in industrial control systems The identified security gaps concern software, firmware and communication protocols of industrial plants as well as facilities of the critical infrastructure and thus have a direct impact on the population worldwide, for example in the area of ​​water supply. A good three quarters of the weak points are ...

Read more

Securing the most critical systems in industrial networks
B2B Cyber ​​Security ShortNews

Claroty and Rockwell Automation introduce new integrations to secure the most critical assets in industrial networks. Solution combines the OT transparency of CTD with the data management functions of AssetCentre. The integration of Continuous Threat Detection (CTD) from Claroty, the Industrial Cybersecurity Company, with FactoryTalk AssetCentre from Rockwell Automation is available immediately. This enables joint customers to automatically recognize, protect and manage operating technology (OT), the Internet of Things (IoT) and industrial IoT (IIoT) in their industrial networks. Risk and weak point assessment and correlation of CTD The joint solution connects the ...

Read more

Endpoint security solution for industrial control systems (ICS)
Endpoint security solution for industrial control systems (ICS)

Trend Micro introduces new endpoint security solution for industrial control systems (ICS). The solution was specially developed to embed ICS environments without interruption in a comprehensive cybersecurity concept. Trend Micro, one of the world's leading providers of cybersecurity, introduces the first OT-native endpoint security solution of its kind, which is offered as part of a comprehensive security solution for smart factories. TXOne StellarProtectTM was developed by TXOne Networks to protect all OT endpoints, regardless of the respective environmental conditions, in business-critical Industrial Control System (ICS) environments. Smart factory environments offer attack surfaces The large number of ICS endpoints in smart factory environments offer numerous attack surfaces, as they are often unpatched or otherwise vulnerable.

Read more

Tenable: Comments on IT security in 2021
Tenable news

Tenable's technology experts provide commentary on the topics they believe will shape the IT security market in 2021. From workarounds to scalable home office strategies Bob Huber, CSO: “During the global pandemic, the CSO's role in protecting the corporate network has shifted from sprint to marathon. Many companies will continue to work remotely in 2021. This presents CSOs with the challenge of maintaining security in these highly dynamic and distributed environments. The initial workarounds are then replaced with scalable, long-term strategies that enable risk-based decision making. A COVID crash course…

Read more

Baramundi Management Suite - new release
B2B Cyber ​​Security ShortNews

Baramundi Software AG publishes the second release of its baramundi Management Suite (bMS) in November. The comprehensive unified endpoint management solution (UEM) has been expanded with the "OT Edition" to include a variant for managing end devices in production environments. In addition to the inventory, this now also enables the detection of weak points on industrial control systems (ICS). The Argus Cockpit monitoring tool has also been expanded and now also monitors individually selected data. baramundi Management Suite - OT Edition Baramundi adds the new OT Vulnerability Identification to the OT Edition - a variant of the Management Suite especially for networked production ...

Read more