News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Five cyber defense strategies
Five cyber defense strategies

In the past two years, attackers have managed to penetrate the systems of 78 percent of German companies. This is shown by the “Data Risk Management” study by Veritas Technologies. What's particularly concerning is that AI tools like WormGPT make it easier for attackers to refine their social engineering attacks through AI-generated phishing emails. But that's not all: AI-controlled, autonomous ransomware attacks will continue to occur more frequently in 2024. Below, Veritas explains the effective methods and proven tips for defending against cyberattacks, especially with regard to ransomware. Password hacking Cybercriminals exploit security gaps and get hold of other people's passwords...

Read more

Executives don’t take cybersecurity too seriously
Executives don’t take cybersecurity too seriously

More than a third of German managers have shared their password with someone outside their own company. A recent study shows how relaxed managers are about cybersecurity. Security provider Ivanti has presented the results of the Executive Security Spotlight Report. The study deals with security behavior specifically at the C-level in the company. Although this group of people is constantly in the focus of spear phishing or whaling actors, executives are surprisingly relaxed when it comes to cybersecurity. Managers are often the target of threats. The main sticking point: Due to their management tasks, they are often given extensive access rights...

Read more

2FA for solid protection of accounts and data
B2B Cyber ​​Security ShortNews

The need to use a 2-factor authentication solution, i.e. the multi-step process for verifying an identity when logging in, is now indispensable. 2FA is one of the fundamental anchors of any defense strategy. Bitkom has just published a study that shows that two-factor authentication has not yet become established, although it massively increases security. Unfortunately, many still rely on complex passwords. Bitkom determines: Still passwords instead of 2FA Three quarters of internet users in Germany (74 percent) pay attention to complex passwords when creating them, which consist of a mix of...

Read more

Companies use insecure password procedures
B2B Cyber ​​Security ShortNews

At 61%, significantly more than half of the German companies surveyed still use insecure practices when managing and using passwords. This is proven by the “2023 Identity Security Threat Landscape” study. This is a key finding of the global study “2023 Identity Security Threat Landscape” by CyberArk. High-profile cyberattacks in which stolen employee logins are used to break into company IT systems are commonplace. The dangers are known and yet, according to the current CyberArk study “Identity Security Threat Landscape”, which provides a global inventory of cybersecurity, 61%…

Read more

Cybersecurity: Younger employees are often more careless
Cybersecurity: Younger employees are often more careless

Younger employees in companies in particular are often more careless when dealing with passwords or phishing links. A study reveals hidden dangers in corporate security. In a recent study, Ivanti took a closer look at the risk exposure of companies worldwide - from risky employee behavior to inconsistencies in safety culture. The study shows that standardized corporate security imposed from above tends to ignore specific risks. These go hand in hand with demographics, gender and function in the company, among other things. A key finding of the study: One in three employees is of the opinion that...

Read more

BSI study on the development status of quantum computers
B2B Cyber ​​Security ShortNews

The Federal Office for Information Security (BSI) has published the update of the “Development status of quantum computers” study. The ongoing development threatens many cryptographic methods currently in use. When planning the necessary transition to quantum-secure cryptography, a reliable assessment of the risk posed by quantum computing to information security is essential. The study presents the development status of current technologies for realizing a cryptographically relevant quantum computer as well as cryptographically relevant quantum algorithms. Quantum computers could crack passwords The advancing development of quantum technologies threatens many cryptographic methods currently in use. Data that is currently not transmitted in quantum-secure encrypted form and…

Read more

Fewer passwords, more security
B2B Cyber ​​Security ShortNews

As part of the 2023 Workforce Authentication Report, the FIDO Alliance and LastPass surveyed more than 1.000 IT leaders worldwide about passwordless authentication. The results show, among other things, that passwords will largely be replaced by secure alternatives in the coming years. The most important step on this path is education, because user acceptance continues to be a challenge in some companies. Most IT managers (89 percent) think that by 2028, less than 25 percent of logins in their companies will be via passwords . 95 percent of those surveyed are already relying on…

Read more

Passwords: Those who are said to be dead live longer
B2B Cyber ​​Security ShortNews

A report from S&P Market Intelligence shows that username and password combinations are still the most commonly used form of authentication in organizations (58 percent). The next most popular forms of authentication are mobile push-based multi-factor authentication (MFA) (47 percent), SMS-based MFA (40 percent) and biometrics (31 percent). “Passwords continue to be the most widely used as organizations seek to balance security, simplicity, cost of ownership and flexibility – especially in hybrid work environments,” said Darren Guccione, CEO and co-founder of Keeper Security. “SSO and passwordless authentication are – although…

Read more

Serious vulnerability: shared passwords
Vulnerability: Shared passwords

Shared workspaces are becoming established in companies. If the passwords are also shared, they can be a gateway for hackers. This is proven by the 2023 Verizon Data Breach Investigations Report. But it is also much easier and more secure with passwordless authentication. Cost savings and increases in productivity are the decisive arguments for shared workspaces for employees. Indeed, shared workspaces have become widespread in many industries. Nevertheless, companies have to deal with the security risks. This starts with ensuring that only the right users have access to shared devices. Common passwords are…

Read more

Frightening: Cyber ​​attack via stolen GPU pixels in the browser 
B2B Cyber ​​Security ShortNews

Cyber ​​attack: Researchers stole the cached, compressed GPU graphics data values ​​from a browser using side channel analysis, reconstructed them using machine learning (ML), and thus obtained website login data and other sensitive data. How the whole thing works sounds shockingly simple - but you can also protect yourself! In a research paper, researchers from Austin Texas, Carnegie Mellon, Washington and Illinois Urbana-Champaign universities present a method for carrying out a side-channel attack on graphics card GPUs that can be used to obtain sensitive information from running programs. This “pixel theft” and their values ​​– artifacts –…

Read more