News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Study: Companies not ready to deal with cybersecurity threats
Study: Companies not ready to deal with cybersecurity threats

German companies are only insufficiently able to protect their sensitive information from loss and misuse. This is one of the central results of a cybersecurity study by the research and analyst firm techconsult on behalf of Proofpoint. The report entitled "Cybersecurity in Germany: Better protection of people and data" illustrates the extent of the problem. 57 percent of German companies had at least one data breach and/or the loss of sensitive information in the last 12 months. 17 percent of the companies surveyed even had to complain about several IT security incidents. These results can be used, among other things...

Read more

Emotet campaign picks up steam again
B2B Cyber ​​Security ShortNews

TA542, a cybercriminal group that distributes Emotet malware, has ended its summer break and is launching more and more new campaigns. However, also with modified Emotet variants. Group TA542 was absent for almost four months and was last seen in action in the summer of July 13, 2022. Since November 2, Proofpoint's security specialists have been monitoring new activities by TA542 - especially in Germany. Key learnings about the Emotet campaigns TA542 uses customized Emotet variants in the new campaigns. The changes (see below) affect the payloads and lures used as well as changes to...

Read more

Cyber ​​security: high priority - high insecurity  
Cyber ​​security: high priority - high insecurity

A study shows that almost half of global executives do not feel well prepared for a cyber attack. And this despite the fact that they also give cybersecurity a high priority. While German executives are the best at assessing cyber vulnerabilities, they need to work on their relationship with the CISO. Proofpoint, Inc., one of the leading next-generation cybersecurity and compliance companies, and Cybersecurity at MIT Sloan (CAMS), an interdisciplinary research consortium, have published their study "Cybersecurity: The 2022 Board Perspective". The report captures what business leaders perceive as the biggest challenges and risks facing their organization. Cyber ​​security at the top...

Read more

Iranian Hackers: Cyber ​​Attacks on Western Political Experts
B2B Cyber ​​Security ShortNews

Proofpoint's cybersecurity experts have released an investigation into the Iran-directed hacking group TA453, also known as Charming Kitten, PHOSPHORUS and APT42. The group has recently started targeting people specializing in Middle East-related issues, nuclear safety and genetic research. Each of their most recently observed email attacks used multiple fake identities. To do this, TA453 used the identities of real people working in Western foreign policy research institutions. The attacks also use new social engineering tactics to carry out work on behalf of the…

Read more

Cyber ​​attacks responsible for higher mortality rate
Cyber ​​attacks responsible for higher mortality rate

As the Ponemon Institute found out in a study, cyber attacks lead to an increased mortality rate in more than 20 percent of affected US healthcare facilities. Cyber ​​attacks result in delays in treatment or testing. That costs lives. Proofpoint, Inc., one of the leading next-generation cybersecurity and compliance companies, and the Ponemon Institute, a leading IT security research institute, present the results of a new study on the consequences of cyber attacks in healthcare. The report, titled "Cyber ​​Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care," found that 89 percent of those surveyed...

Read more

New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co
New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co

The use of macros to spread malware has declined significantly: by as much as 2021 percent between October 2022 and June 66. However, attackers are beginning to use tricks to circumvent the protection. Commonly, cyber criminals use VBA macros to automatically execute malicious content if a user has macros enabled in Office applications. XL4 macros, on the other hand, are specific to the Excel application, but can also be used by attackers as a tool for spreading malware. The masterminds behind macro-based attacks typically use social engineering to convince the recipient…

Read more

EU financial company attacked with EvilNum malware
EU financial company attacked with EvilNum malware

Proofpoint's threat research team has observed that the hacker group, dubbed TA4563 by the company, is using the EvilNum malware to attack various European financial and investment firms. EvilNum is a backdoor used to steal data or download additional malware payloads can be used. The most recently observed campaigns by the group exclusively targeted companies from the decentralized finance sector (Decentralized Finance: DeFi). Previously, however, organizations involved in the foreign exchange business or trading in cryptocurrencies also came into the crosshairs of the attackers. DeathStalker or EvilNum at Work As part of its investigations, Proofpoint was able to…

Read more

Media and journalists targeted by state hackers
Media and journalists targeted by state hackers

Proofpoint IT security researchers have witnessed various state-sponsored hacker groups targeting journalists for espionage, spreading malware and infiltrating media organization networks. Journalists and media organizations are attractive targets for cybercriminals. Proofpoint researchers have observed that APT cybercriminals, particularly those sponsored by or affiliated with a state, routinely impersonate or target journalists or media organizations. The media sector and the people working there can open doors that remain closed to others. Targeted Attacks on Journalist Mail Accounts A well-timed, successful attack…

Read more

Employee kit for safe social media use
B2B Cyber ​​Security ShortNews

Social media has radically changed everyday life – for better and for worse. Many companies are increasingly feeling the negative side. Proofpoint's IT security experts provide companies with a free social media security kit. In recent years, companies have invested a lot of money and time in securing their IT infrastructures against cybercriminals. They have been so successful that criminals are making fewer attempts than ever to technically defeat security measures (often without the necessary know-how). Instead, they aim more and more to exploit human weaknesses...

Read more

Ransomware & OneDrive: Attackers delete version backups

Proofpoint has discovered potentially dangerous Microsoft Office 365 features that attackers use to delete recovery version files stored on SharePoint and OneDrive in order to more easily blackmail victims. Ransomware attacks traditionally target data across endpoints or network drives. Until now, IT and security teams have believed that cloud drives are more resilient to ransomware attacks. After all, the now well-known “AutoSave” feature, along with versioning and the good old recycle bin for files as a backup, should have sufficed. But that might not be the case for much longer. Vulnerability in Microsoft 365 and OneDrive Proofpoint…

Read more