News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

How attackers slip through vulnerabilities in web applications
How attackers slip through vulnerabilities in web applications - Image by Mohamed Hassan on Pixabay

Access control vulnerabilities and data disclosure risks are the most common security flaws in corporate-developed web applications. This is shown by a current analysis in the period 2021 to 2023. This makes it too easy for attackers to break into companies. For its report, security specialist Kaspersky examined vulnerabilities in self-developed web applications from companies in the IT, government, insurance, telecommunications, cryptocurrencies, e-commerce and healthcare sectors. Self-developed web applications defective The majority (70 percent) of the vulnerabilities found concern the areas of data protection with regard to confidential information such as passwords, credit card details, health records, personal data and confidential…

Read more

Microsoft forgets its own passwords on freely accessible servers 
B2B Cyber ​​Security ShortNews

Microsoft has fixed a major security error: despite an external warning, a large number of codes, scripts and configuration files with passwords, keys and login information for accessing services for the search engine Bing were lying on an unprotected server in Azure for weeks. As the technology portal TechCrunch reports, security researchers Can Yoleri, Murat Özfidan and Egemen Koçhisarlı from SOCRadar reported that they found internal information about Microsoft's Bing search engine on an open server in Azure. The specialists usually look for vulnerabilities that could be attacked. In this case there was no hurdle for immediate...

Read more

Passkey support for mobile devices
Passkey support for mobile devices MS - AI

Zero-trust and zero-knowledge credential protection provider Keeper Security announces support for passkey management for iOS and Android mobile devices. This means there is cross-platform functionality for both passkeys and traditional passwords. This gives SMEs in particular access to a professional solution. With Keeper, passkeys are created, stored, and managed in the Keeper Vault and can be used to easily log in to websites and applications across all browsers and operating systems. As long as the user has access to their Keeper Vault, they can access their passkeys,…

Read more

Five cyber defense strategies
Five cyber defense strategies

In the past two years, attackers have managed to penetrate the systems of 78 percent of German companies. This is shown by the “Data Risk Management” study by Veritas Technologies. What's particularly concerning is that AI tools like WormGPT make it easier for attackers to refine their social engineering attacks through AI-generated phishing emails. But that's not all: AI-controlled, autonomous ransomware attacks will continue to occur more frequently in 2024. Below, Veritas explains the effective methods and proven tips for defending against cyberattacks, especially with regard to ransomware. Password hacking Cybercriminals exploit security gaps and get hold of other people's passwords...

Read more

Executives don’t take cybersecurity too seriously
Executives don’t take cybersecurity too seriously

More than a third of German managers have shared their password with someone outside their own company. A recent study shows how relaxed managers are about cybersecurity. Security provider Ivanti has presented the results of the Executive Security Spotlight Report. The study deals with security behavior specifically at the C-level in the company. Although this group of people is constantly in the focus of spear phishing or whaling actors, executives are surprisingly relaxed when it comes to cybersecurity. Managers are often the target of threats. The main sticking point: Due to their management tasks, they are often given extensive access rights...

Read more

2FA for solid protection of accounts and data
B2B Cyber ​​Security ShortNews

The need to use a 2-factor authentication solution, i.e. the multi-step process for verifying an identity when logging in, is now indispensable. 2FA is one of the fundamental anchors of any defense strategy. Bitkom has just published a study that shows that two-factor authentication has not yet become established, although it massively increases security. Unfortunately, many still rely on complex passwords. Bitkom determines: Still passwords instead of 2FA Three quarters of internet users in Germany (74 percent) pay attention to complex passwords when creating them, which consist of a mix of...

Read more

Companies use insecure password procedures
B2B Cyber ​​Security ShortNews

At 61%, significantly more than half of the German companies surveyed still use insecure practices when managing and using passwords. This is proven by the “2023 Identity Security Threat Landscape” study. This is a key finding of the global study “2023 Identity Security Threat Landscape” by CyberArk. High-profile cyberattacks in which stolen employee logins are used to break into company IT systems are commonplace. The dangers are known and yet, according to the current CyberArk study “Identity Security Threat Landscape”, which provides a global inventory of cybersecurity, 61%…

Read more

Cybersecurity: Younger employees are often more careless
Cybersecurity: Younger employees are often more careless

Younger employees in companies in particular are often more careless when dealing with passwords or phishing links. A study reveals hidden dangers in corporate security. In a recent study, Ivanti took a closer look at the risk exposure of companies worldwide - from risky employee behavior to inconsistencies in safety culture. The study shows that standardized corporate security imposed from above tends to ignore specific risks. These go hand in hand with demographics, gender and function in the company, among other things. A key finding of the study: One in three employees is of the opinion that...

Read more

BSI study on the development status of quantum computers
B2B Cyber ​​Security ShortNews

The Federal Office for Information Security (BSI) has published the update of the “Development status of quantum computers” study. The ongoing development threatens many cryptographic methods currently in use. When planning the necessary transition to quantum-secure cryptography, a reliable assessment of the risk posed by quantum computing to information security is essential. The study presents the development status of current technologies for realizing a cryptographically relevant quantum computer as well as cryptographically relevant quantum algorithms. Quantum computers could crack passwords The advancing development of quantum technologies threatens many cryptographic methods currently in use. Data that is currently not transmitted in quantum-secure encrypted form and…

Read more

Fewer passwords, more security
B2B Cyber ​​Security ShortNews

As part of the 2023 Workforce Authentication Report, the FIDO Alliance and LastPass surveyed more than 1.000 IT leaders worldwide about passwordless authentication. The results show, among other things, that passwords will largely be replaced by secure alternatives in the coming years. The most important step on this path is education, because user acceptance continues to be a challenge in some companies. Most IT managers (89 percent) think that by 2028, less than 25 percent of logins in their companies will be via passwords . 95 percent of those surveyed are already relying on…

Read more