News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Study: Every second endpoint is at risk due to missing patches
Study: Every second endpoint is at risk due to missing patches

According to a study by Adaptiva and the Ponemon Institute, companies are investing in protecting their endpoints. Nevertheless, they often find it difficult to reliably address every endpoint and to provide updates and patches. This increases the risk of cyberattacks and security breaches. Adaptiva, provider of endpoint management and security solutions, has partnered with the Ponemon Institute to publish the study "Managing Risks and Costs at the Edge". In it, they show the difficulties many companies have in managing their endpoints, especially due to the distributed infrastructures that accompany the new world of work. missing…

Read more

VMware Warning: Patch Critical Vulnerabilities 
B2B Cyber ​​Security ShortNews

VMware releases some updates for several severe vulnerabilities in various products. With some products, it is even possible for attackers to gain administrative access to the products without a password. VMware users should act quickly, patch and close the gaps. According to VMware, the following products are affected by the gaps and patches are available: Workspace ONE Access, Workspace, ONE Access Connector, Identity Manager, Identity Manager Connector, vRealize Automation, Cloud Foundation and vRealize Suite Lifecycle Manager. The VMware advisory VMSA-2022-0021 lists the individual gaps and the recommended measures for them. VMware VMSA-2022-0021…

Read more

Vulnerability Report 2021: Many critical vulnerabilities
B2B Cyber ​​Security ShortNews

The experts at Citadelo have presented the new Vulnerability Report 2021. The penetration tests carried out worldwide served as the data basis. 50 percent of the projects examined had at least one critical weakness. Citadelo, one of the fastest growing cybersecurity companies in Europe based in Zug, Switzerland, has presented its 2021 vulnerability report - and is sounding the alarm. “On average, 50% of the projects had at least one critical vulnerability, and medium to high vulnerabilities were found in almost all projects tested,” said Mateo Meier, Board Member of Citadelo. Critical Vulnerabilities with Disastrous Consequences While less severe vulnerabilities…

Read more

F-Secure and WithSecure scan engines at medium risk
B2B Cyber ​​Security ShortNews

A slight but not entirely harmless vulnerability in several F-Secure products and the business version WithSecure allows attackers to crash the programs. F-Secure actually distributes the patches automatically. According to the portal heise.de, the products from F-Secure and the new business brand WithSecure have a vulnerability. Attackers could crash the scan engine in F-Secure products, preventing detection. WithSecure's product, the effects of an attack sound worse, since it should be possible to delete local data and bypass the protective measures. But one…

Read more

CVE hotspots at a glance
CVE hotspots at a glance

Spotlights at a glance: WatchGuard launches new CVE overview page. Single point of contact for WatchGuard users, MSPs and channel partners lists important information about potential security vulnerabilities. With the new CVE overview page, WatchGuard's Product Security Incident Response Team (PSIRT) has created a platform that is specifically aimed at all users, MSPs and channel partners of WatchGuard products. This lists currently known vulnerabilities and vulnerabilities (Common Vulnerabilities and Exposures, CVE) in detail and offers further information on how to deal with these anomalies - across the entire WatchGuard portfolio. In addition,…

Read more

Log4j alarm: this is what F-Secure says about the security gap
Log4j Log4shell

A vulnerability in the Log4J library, which was discovered on Friday, December 10th, rocked software manufacturers and service providers around the world. The weak point in the standardized method for processing log messages in software from Microsoft's Minecraft to e-commerce platforms is already being attacked by attackers. It is almost impossible to describe the extent of the risk that currently exists in vulnerable applications. If a user-controlled string that targets the vulnerability is logged, the vulnerability can be run remotely. In simple terms, an attacker can use this vulnerability ...

Read more

Dangerous contaminated sites: old unpatched vulnerabilities
Dangerous contaminated sites: old unpatched vulnerabilities

Unpatched software vulnerabilities remain attractive targets for cyber criminals long after they have been discovered. The contaminated sites do not resolve themselves. An analysis by Barracuda shows how dangerous this can be. It can be a fatal fallacy to believe that identified software vulnerabilities are no longer dangerous. Anyone who is careless and thinks to wait before closing the gateway, which is urgently needed, because there are currently much more important things to do within their own IT infrastructure, is vastly mistaken. Because it is precisely this negligence that many hackers rely on and look one more time where ...

Read more

Ivanti: Recommendations for patch prioritization of the vulnerabilities
Ivanti: Recommendations for patch prioritization of the vulnerabilities

Analysis of Patch Tuesday in July and recommendations from Ivanti to prioritize the elimination of vulnerabilities (CVEs). Patch Tuesday in July 2021 has it all. With the recent PrintNightmare out-of-band update, the upcoming quarterly Oracle CPU, a number of updates from Adobe including Acrobat and Reader, Mozilla Firefox and Firefox ESR, and the typical series of Microsoft monthly updates, Patch Tuesday includes a lot of vulnerabilities in July that should be prioritized. PrintNightmare security vulnerability It starts with PrintNightmare CVE-2021-34527, which after the June Patch Tuesday update was identified as another security vulnerability in the Print Spooler ...

Read more

IT Complete platform for remote work
IT Complete platform for remote work

New innovations from Kaseya strengthen the IT Complete platform for remote work and compliance requirements. Thanks to the updates, IT experts can recognize virtual machines, adapt cybersecurity training modules and find their way around despite constant changes in the CMMC guidelines. Kaseya, the leading provider of IT and security management solutions for managed service providers (MSPs) and small to medium-sized businesses (SMB), introduces several new product improvements and workflow integrations. These strengthen the Kaseya IT Complete platform, a comprehensive suite of integrated IT tools developed for the multifunctional IT professional. IT teams overburdened by remote work and cyber attacks IT teams were already out last year due to the demands on ...

Read more

Unsolved CVEs as exploit points of attack
ivanti news

Ivanti assesses Patch Tuesday in October: Fewer resolved vulnerability problems and no further browser update from Microsoft promotes exploit development. Microsoft interrupted the series of 100 CVEs per month on Patch Tuesday in October, as only 87 CVEs were resolved this month. Six of them were announced publicly. Such a publication is like a kind of jumpstart for attackers in terms of research and development of exploits. To be on the safe side, special attention should therefore be paid to these CVEs. Open vulnerabilities invite exploit attackers The big news in October: Microsoft has the ...

Read more