News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Fake updates spread malware
B2B Cyber ​​Security ShortNews

Security experts have identified a new threat. It redirects users to compromised websites and prompts them to download fake updates that lead to malware downloads. The malware is tailored to the user's geographic location and varies depending on their location. Security experts have identified a growing threat from so-called "fake update" attacks. These attacks use fake update notifications to trick users into installing malware. Two newly identified threat actors (TA2726 and TA2727) are emerging as driving the spread of malware via compromised websites. Fake updates entice users to download malware. The attackers use...

Read more

Alleged espionage campaign with malware called Voldemort
B2B Cyber ​​Security ShortNews

Cybersecurity experts have identified a large-scale malware campaign called Voldemort. The malware used in this campaign was distributed via phishing emails. To ensure that as many recipients as possible fell for these messages, the attackers posed as tax authorities from various countries - including the Federal Central Tax Office. Proofpoint analysts now attribute this campaign to the China-aligned threat group TA415 (also known as APT41 and Brass Typhoon). This attribution is based on several newly identified, highly trusted connections between the campaign spreading Voldemort and known TA415-associated infrastructure, including overlaps with activities identified by Mandiant...

Read more

Cybersecurity Trends 2025
Cybersecurity Trends 2025

Cybersecurity is currently undergoing a dramatic change. As cybercriminals increasingly develop AI-powered attack methods and refine their tactics, organizations are challenged to keep up with the growing complexity of multi-cloud environments and stricter data protection regulations. What does this mean for cybersecurity in the coming year? 2024 has shown that state-led cyber espionage operations are closely linked to geopolitical dynamics. In 2025, APT operations will continue to reflect global and regional conflicts. The cyber espionage campaigns that precede these conflicts will not be limited to major nations that were considered the most important cyber actors in the past, but to…

Read more

Cyberattacks on healthcare facilities are increasing
B2B Cyber ​​Security ShortNews

A US study on cybersecurity in healthcare has shown that patient well-being is increasingly at risk from cyberattacks. Nine out of ten healthcare facilities have been the victim of a cyberattack in the past twelve months, with consequences affecting patients. Proofpoint, together with the Ponemon Institute, has published the third annual study on cybersecurity in healthcare. The report, entitled "Cyber ​​Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care 2024", shows a worrying increase in cyberattacks in healthcare. Almost 92 percent of the organizations surveyed in…

Read more

AI-driven platform protects against a variety of threats
AI-driven platform protects against a variety of threats

A leading cybersecurity company has enhanced the capabilities of its platform, including protection against threats in social media, messaging and SaaS applications, as well as data and identity theft. Proofpoint, a leading cybersecurity and compliance company, today announced the expansion of the capabilities of its award-winning platform to provide its customers with broader, adaptive and human-centric security controls. The new solutions and integrations protect organizations against threats in messaging, collaboration and social media applications, protect SaaS applications and identities across a wide range of applications, prevent data loss with intelligent, adaptive data security and guide...

Read more

End-to-end framework protects against data loss
End-to-end framework protects against data loss

Proofpoint and certified partners introduce their customers to a NIST-aligned, end-to-end framework that helps develop, implement and optimize data loss prevention (DLP) programs. Although DLP programs and technologies are becoming increasingly sophisticated, only 38% of organizations believe they have a "mature" DLP program. Organizations with complex requirements are looking for more comprehensive solutions that go beyond traditional DLP measures. Until now, the industry has lacked a practical framework that covers the challenges of implementing a DLP program in a rapidly evolving, multi-channel risk situation. Framework supports NIST requirements Proofpoint's framework aligns...

Read more

CISO survey: Most companies pay for ransomware
CISO survey: Most companies pay for ransomware

In the Voice of the CISO report, over half of the CISOs surveyed from German companies stated that they had been faced with a loss of sensitive data in the last year. 77 percent of these losses were due to former employees. "The correct handling of ransomware attacks remains a hot topic in IT security," comments Miro Mitrovic, Area Vice President Sales DACH at Proofpoint. "According to our State of the Phish report, 85 percent of German companies were successfully infected with ransomware last year (an increase of 35% compared to the previous year)...

Read more

Report: 86 percent of CISOs rely on AI-based cybersecurity
Report: 86 percent of CISOs rely on AI-based cybersecurity

72 percent of German Chief Information Security Officers (CISOs) see employee failure as the greatest cyber risk. 62 percent of them invest in employee training on data security, according to the results of a large survey. Proofpoint, a leading cybersecurity and compliance company, is publishing its new "Voice of the CISO" report. It examines the most important challenges, expectations and priorities of Chief Information Security Officers (CISOs) around the world. 80 percent of CISOs expect a major cyberattack This year's edition of the Proofpoint "Voice of the CISO" report reveals that CISOs of German companies continue to be very afraid of cyberattacks...

Read more

SugarGh0st RAT: Trojan specifically targets AI experts
SugarGh0st RAT: Trojan specifically targets AI experts

SugarGh0st RAT (Remote Access Trojan) appears to be aimed at obtaining US non-public information on generative artificial intelligence. Chinese actors may be behind it. Proofpoint recently identified a campaign using the SugarGh0st RAT (Remote Access Trojan) targeting organizations in the US. Academic, private and government organizations working on artificial intelligence were targeted by the attackers. Proofpoint tracks the cluster responsible for this activity as UNK_SweetSpecter. Proofpoint uses the "UNK_" prefix to name clusters of activity that are still in development and...

Read more

Email security: protection against social engineering
Email security: protection against social engineering

Social engineering is one of the main techniques cyber attackers use to threaten email security. One in seven clicks on a malicious URL in email occur within 60 seconds of receiving the message. Proofpoint, a leading cybersecurity and compliance company, today introduces two innovations. With these, the company takes email security to a new level and offers the most comprehensive and effective end-to-end email protection. Proofpoint's Core Email Security Packages uniquely combine new detection capabilities before, during and after email delivery. These include: The industry's first and only protection against…

Read more