News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Secure data in production
Secure data in production

IT and OT are merging more and more, with the effect that production environments can also be directly affected by cyber attacks. A particularly drastic example occurred last year when hackers paralyzed Toyota's entire production facility. Nils Gerhardt, Chief Technology Officer, from Utimaco shows five principles that companies should observe in order to secure their production in the best possible way. Encrypt sensitive data Software-based data and folder encryption ensures that, if in doubt, criminals cannot do anything with stolen data. This means that trade secrets are protected even if a company falls victim to a hacker attack. Effective…

Read more

NIS2 for the security of the industrial sector
NIS2 for the security of the industrial sector

Manufacturing is a crucial part of the European economy and encompasses many areas from small-scale production to large-scale industrial processes. NIS2 aims to reduce cybercrime losses. As the sector becomes more digitized and connected, it faces increasing cybersecurity risks that could have serious consequences for public health and safety. To address these risks, the NIS2 directive classifies manufacturing organizations as critical entities and establishes new cybersecurity requirements that must now be met. The great relevance of…

Read more

Supply chain problem: 8,9 million times factory Android malware
Trend Micro News

At the Black Hat Asia hacking conference, researchers from the security provider Trend Micro announced that millions of Android smartphones worldwide are infected with malicious firmware - and this before the devices even leave production. According to the Lemon Group hacker group, it was able to inject malware called "Guerrilla" into 8,9 million devices. The security researchers warn that cybercriminals rent out remote access to Android smartphones via proxy plugins and are charged per minute for it. Keystrokes of passwords, geographic location, IP address and other confidential data can be accessed. The advertisement for…

Read more

Ransomware: Manufacturing and production pays the highest ransom
Ransomware: Manufacturing and production pays the highest ransom

The Sophos State of Ransomware study shows that manufacturing and manufacturing companies worldwide paid rare ransoms, averaging over $2 million, but at the same time more than twice as much as companies in other industries. A frightening development. Sophos released this year's industry study, The State of Ransomware in Manufacturing and Production, which specifically looked at the manufacturing and production space. The study shows that this sector has the highest average ransom payments of any industry studied. Affected companies raised $2.036.189 for the extortionist's demands, while companies in other industries...

Read more

Study: vulnerable IoT in medicine, production and KRITIS
Study: vulnerable IoT in medicine, production and KRITIS

IoT Security Report 2022 uncovers significant gaps in cyber security. A study reveals many vulnerable IoT systems in the areas of medicine, production and KRITIS. Business leaders should think about increasing liability. Cyber ​​security is still thought of in silos - that is the conclusion of a study by the specialist for IoT security ONEKEY. “In many cases, companies and entrepreneurs still think in classic silos when it comes to IT security. The immediately growing risk of many different firmware versions in IoT systems is often overlooked,” warns Jan Wendenburg, Managing Director of ONEKEY. Highest IoT threat in medicine To the areas…

Read more