News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hospitality industry: Attacks on booking platform
Bitdefender_News

Cybercriminals stole the credit card details, personal information and passwords of customers of the restaurant booking platform IRM-NG. Bitdefender has published the latest research results from a cyber criminal campaign currently underway on the IRM-NG booking platform used in the hotel and hospitality industry. The attackers use vulnerabilities in the platform in combination with backdoors and techniques to bypass password validation on the end device and thus steal credit card data, passwords and customers' personal data. Security gap still exists Bitdefender has not received any response from the manufacturer Resort Data Processing (RDP) to its information for months. The vulnerability still exists and…

Read more

Effortless authentication with passkeys
Effortless authentication with passkeys

Browser extension and desktop app support storing and managing passkeys. This allows users to log into websites more securely than ever before. Passkeys are also phishing resistant and protects teams. Keeper Security announces passkey support for its platform. Passkeys are stored and managed in Keeper and can be used for easy login to websites and applications in all desktop web browsers and operating systems. The passkeys can also be exchanged between teams in companies. Simple and phishing-resistant passkeys Passkeys are easier to use than many traditional authentication methods. In addition, they are…

Read more

Cloud: Sticking to passwords despite security risks
Cloud: Sticking to passwords despite security risks

A new industry study reveals that half of cloud professionals surveyed are frustrated with password hygiene requirements. But the experts want to stick to the passwords, although there are secure alternatives with MFA. A survey at Cloud Expo Europe provides information. Even most cloud professionals still cling to the use of passwords, despite their well-known security vulnerabilities, their value as a target for cybercriminals, and widespread user frustration with the complexity of proper password management. That's according to a new industry study...

Read more

New Study: Web Shells Are Top Incidence Vector
New Study: Web Shells Are Top Incidence Vector

The number of attacks via web shells increased at an above-average rate in the first three months of 2023. The Cisco Talos Report shows that attacks via web shells are the new top attack vector in the first quarter of 1. Ransomware can be warded off better. According to Cisco Talos analysis, this type of attack was responsible for a quarter of all incidents investigated by the Incident Response Team in the first quarter of 2023. At the same time, the proportion of detected ransomware attacks fell from 2023% to 20%. However, the cyber researchers are not giving the all-clear: Because a fifth of all observed threat activities were…

Read more

AI cracks passwords faster
B2B Cyber ​​Security ShortNews

HOME SECURITY HEROES company used an AI password cracker called PassGAN to generate a list of over 15,5 million passwords. A matrix shows how quickly an AI can calculate a password that is too weak, so the popular “password” takes exactly 3 seconds. It immediately calculates something like “1234567890”. Unfortunately, many users still use passwords that are far too weak for their services because they can remember them more easily. Employees like to bring this bad habit with them to a company if they are allowed to freely choose their passwords there. All too often administrators make…

Read more

Unnecessary risk: sharing passwords in companies 
Unnecessary risk: sharing passwords in companies

A message via a messenger service or an email to a colleague may be the quickest way to share passwords. But it is an insecure and risky path that puts the entire organization at high risk from cyber attacks. Many businesses, especially those involved in tech and digital, require ongoing communication and online file sharing. Therefore, sharing accounts is often required in a collaborative work environment. This means that employees have to find an easy way to pass on access and passwords to each other - if possible without...

Read more

PayPal: Hacker access to almost 35.000 accounts
B2B Cyber ​​Security ShortNews

According to various media, hackers had access to almost 35.000 PayPal accounts. The provider was not hacked, but the accounts were compromised via credential stuffing. This means that users were too lazy to use different passwords, didn't replace their leaked passwords and didn't use 2-factor authentication. The passwords were then simply tried out successfully by the hackers at PayPal. A successful hack and the stupidity of users are often confused. To access the PayPal accounts, the hackers filtered customer details and passwords from various other hacks of companies or password database providers and linked them to the…

Read more

Check: US Department of the Interior cracks 18.000 internal passwords
Check: US Department of the Interior cracks 18.000 internal passwords

The US Department of the Interior (DOI) checked almost 86.000 US government passwords during a security check. Over 18.000 were cracked, almost 14.000 of them in just 90 minutes. 362 High-level employee accounts are extremely insecure. Many media keep reporting that private users use passwords that are too simple, such as 12345 or Password123. While experts continue to find it hard to believe, there is now evidence that these passwords were even used within the US government. This is confirmed by the internal security check of the American Department of the Interior - DOI - Department of the...

Read more

Data protection: find sensitive data in Microsoft 365, AWS or Google
B2B Cyber ​​Security ShortNews

In addition to sensitive data, the secrets in companies also include stored information on access data, API keys or passwords on drives or in the cloud at AWS, Microsoft 365 or Google. To track down and classify these "secrets" in the corporate environment, Varonis now offers Secrets Discovery. With increasing cloud usage and ever faster app development, secrets, i.e. confidential information such as API keys or passwords, can end up almost anywhere and reveal intellectual property, source code and critical infrastructure. Accordingly, open secrets are increasingly responsible for devastating data breaches. The new data classification possibilities from Varonis Systems, Inc. the specialists...

Read more