News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Attacks on the supply chain
Attacks on the supply chain

Attackers have always looked for the weakest link in the chain in order to break through a defence. This has not changed in today's highly digitized business world and also includes the supply chain of the supplier industry. Suppliers often have access to their customers' internal systems, and a hack on seemingly insignificant suppliers can mean for hacker groups entry into the network of a global corporation. Attacks via the software supply chain are even more common and have even more dramatic effects. So instead of attacking the targeted company directly, cybercriminals target their software distributors…

Read more

NIS2 comes into effect
NIS2 comes into effect

The European Union NIS2 Directive comes into effect. With the second directive on the security of network and information systems, the EU is reacting to cyber attacks on socially particularly relevant institutions and organizations, which are increasing sharply in times of geopolitical crisis. The protection of critical infrastructure is to be further improved, the requirements for its operators are increasing significantly: On Monday, January 16, the NIS2 directive of the European Union will come into force. The EU is thus reacting to the sharp increase in cyber attacks in times of geopolitical crisis, which threaten institutions and organizations that are particularly relevant to society. Hurry is required, the threat situation…

Read more

Cyber ​​risks for finance & KRITIS operators
Cyber ​​risks for finance & KRITIS operators

Fights against land and life, economic sanctions and trade restrictions are threatening cyber risks that Europe has to deal with in these times. Another danger are targeted cyber attacks by states that see their own interests or those of countries united in solidarity at risk. Finance is considered one of the most vulnerable sectors of critical infrastructure - despite strong legal regulations. Producers and operators as well as suppliers of critical infrastructure have become the target of attacks more often than average in the past twelve months. In about half of the cases, economic cycles, human life and ultimately our…

Read more

IT Security Act 2.0: Protection of critical infrastructures

On May 1, 2023, the amendment to the IT Security Act 2.0 will come into force. When the transition period expires, the BSI is demanding new requirements from operators of critical infrastructure. What that will be in detail, who will be affected and what measures must be taken by then. A comment from Radar Cyber ​​Security. Cyber ​​criminals are increasingly targeting operators of critical infrastructures and companies with particular economic importance. This can not only lead to production losses worth millions and supply bottlenecks, but in the worst case it can endanger public safety. In addition, you have to…

Read more

Critical infrastructures: requirements of the IT Security Act 2.0
Critical infrastructures: requirements of the IT Security Act 2.0

Critical infrastructures (KRITIS) in the context of cyber attacks: are all protective measures in line with the new IT Security Act 2.0? The IT Security Act 2.0 has resulted in significant adjustments for operators of critical infrastructures. Producers and utilities in the fields of energy, water, finance and health as well as industrial companies are increasingly being targeted by attackers. The result: production losses worth millions and supply bottlenecks, up to and including endangering human life. Recent examples include attacks on the largest pipeline in the United States, the Irish health authority, and an incident at a Croatian substation that brought Europe to the brink of a power blackout. KRITIS attacks…

Read more

Ransomware: Backup alone is not a security strategy
Ransomware: Backup alone is not a security strategy

Many companies think their data backup protects them against ransomware. The enticingly simple logic behind it: If you can restore all the data, you are not open to blackmail. By Ali Carl Gülerman, CEO and General Manager, Radar Cyber ​​Security. However, this is too short-sighted: Even if the system was successfully restored after an attack, sensitive information such as customer data or intellectual property could have been stolen. In addition, the risk of attack remains: Hackers can still be in the network or gain access again by installing a back door. In some cases, ransomware is used by cybercriminals as a red herring, ...

Read more

Log4j alarm: this is what IT security experts recommend 
Log4j Log4shell

IT security experts comment on the log4j security gap for which the BSI has declared the warning level red. Experts from Barracuda Networks, Radar Cyber ​​Security and ForeNova provide an assessment of the situation. Jonathan Tanner, Senior Security Researcher at Barracuda Networks How can companies identify this vulnerability in their technology and what are the risks if it is not addressed? “First you should check whether a version of log4j prior to 2.15.0 is being used, including the dependencies. Both Maven and Gradle - both Java-based build management tools - offer the option of creating the entire dependency tree for ...

Read more