News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Study: Danger from lack of post-quantum cryptography
Study: Danger from lack of post-quantum cryptography Image: Bing - AI

The Entrust Cybersecurity Institute has published the results of a global survey on post-quantum cryptography. It analyzes the extent to which companies are prepared for the threats posed by quantum computing and are switching to quantum-safe encryption. The "post-quantum threat" is that quantum computers will be able to crack conventional public key cryptography within the next decade. And it is getting closer: According to the Global Risk Institute, quantum computers will endanger cybersecurity as early as 2027. Post-quantum cryptography The first three final post-quantum encryption standards were recently published by the NIST. These contain usage and...

Read more

Outdated usernames and passwords widespread
Outdated usernames and passwords widespread

At a time of uncertainty caused by AI and the rise of cybersecurity breaches, a hardware authentication security key provider has released its 2024 Global State of Authentication Survey. Conducted by Talker Research, the survey surveyed 20.000 people from around the world, including Australia, France, Germany, India, Japan, Poland, Singapore, Sweden, the UK and the US. The aim was to determine perceptions and understanding of the global impact of cybersecurity in both personal and corporate settings, the risks posed by inadequate security practices, the potential threat of…

Read more

Telegram: 361 million user data leaked
Eset_News

Cyber ​​criminals have published millions of email addresses as well as usernames and passwords for online accounts in channels of the messenger service Telegram, according to the operator of the site "Have-I-been-pwnd". According to a recent blog post by Troy Hunt, unknown persons have published over 122 gigabytes of data in channels of the messenger app Telegram. Troy Hunt is the operator of Have-I-been-pwned, a database for leaked access data. This includes: 361 million email addresses, almost half of which have apparently never appeared in such a data leak before. Usernames and passwords for online accounts were also part of the leak....

Read more

Authentication without any passwords
Authentication without any passwords

Passwords are a thing of the past. With "Passwordless 360°" all customers, employees, partners, business customers and suppliers of a company can authenticate securely with a single solution. Thales, the world's leading technology and security provider, announces the launch of Passwordless 360°, a new concept for passwordless authentication. Thales customers benefit from the broadest coverage of passwordless authentication across multiple types of users and security levels. Passwordless 360° offers companies the flexibility to use the latest technologies such as FIDO passkeys while getting the most out of previous investments in passwordless technologies. Users manage up to...

Read more

How attackers slip through vulnerabilities in web applications
How attackers slip through vulnerabilities in web applications - Image by Mohamed Hassan on Pixabay

Access control vulnerabilities and data disclosure risks are the most common security flaws in corporate-developed web applications. This is shown by a current analysis in the period 2021 to 2023. This makes it too easy for attackers to break into companies. For its report, security specialist Kaspersky examined vulnerabilities in self-developed web applications from companies in the IT, government, insurance, telecommunications, cryptocurrencies, e-commerce and healthcare sectors. Self-developed web applications defective The majority (70 percent) of the vulnerabilities found concern the areas of data protection with regard to confidential information such as passwords, credit card details, health records, personal data and confidential…

Read more

Microsoft forgets its own passwords on freely accessible servers 
B2B Cyber ​​Security ShortNews

Microsoft has fixed a major security error: despite an external warning, a large number of codes, scripts and configuration files with passwords, keys and login information for accessing services for the search engine Bing were lying on an unprotected server in Azure for weeks. As the technology portal TechCrunch reports, security researchers Can Yoleri, Murat Özfidan and Egemen Koçhisarlı from SOCRadar reported that they found internal information about Microsoft's Bing search engine on an open server in Azure. The specialists usually look for vulnerabilities that could be attacked. In this case there was no hurdle for immediate...

Read more

Passkey support for mobile devices
Passkey support for mobile devices MS - AI

Zero-trust and zero-knowledge credential protection provider Keeper Security announces support for passkey management for iOS and Android mobile devices. This means there is cross-platform functionality for both passkeys and traditional passwords. This gives SMEs in particular access to a professional solution. With Keeper, passkeys are created, stored, and managed in the Keeper Vault and can be used to easily log in to websites and applications across all browsers and operating systems. As long as the user has access to their Keeper Vault, they can access their passkeys,…

Read more

Five cyber defense strategies
Five cyber defense strategies

In the past two years, attackers have managed to penetrate the systems of 78 percent of German companies. This is shown by the “Data Risk Management” study by Veritas Technologies. What's particularly concerning is that AI tools like WormGPT make it easier for attackers to refine their social engineering attacks through AI-generated phishing emails. But that's not all: AI-controlled, autonomous ransomware attacks will continue to occur more frequently in 2024. Below, Veritas explains the effective methods and proven tips for defending against cyberattacks, especially with regard to ransomware. Password hacking Cybercriminals exploit security gaps and get hold of other people's passwords...

Read more

Executives don’t take cybersecurity too seriously
Executives don’t take cybersecurity too seriously

More than a third of German managers have shared their password with someone outside their own company. A recent study shows how relaxed managers are about cybersecurity. Security provider Ivanti has presented the results of the Executive Security Spotlight Report. The study deals with security behavior specifically at the C-level in the company. Although this group of people is constantly in the focus of spear phishing or whaling actors, executives are surprisingly relaxed when it comes to cybersecurity. Managers are often the target of threats. The main sticking point: Due to their management tasks, they are often given extensive access rights...

Read more