News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

After the LockBit blow: What about ransomware attacks?

In a current report, Trend Micro analyzes the ransomware landscape and provides an outlook on the impact the interruption of LockBit activities has on it. LockBit was not completely broken up, but its activity was severely suppressed and new malicious code developments were discovered and thus rendered unusable. In collaboration with the British National Crime Agency (NCA), Trend Micro was able to provide detailed analyzes of the ransomware group's activities and permanently disrupt the entire functionality of the malware. Since 2022, LockBit and BlackCat have consistently been among the Ransomware-as-a-Service (RaaS) providers with the most discoveries. Globally you can...

Read more

Hackers paralyze the Genios economic database
B2B Cyber ​​Security ShortNews

Libraries, universities and companies currently do not have access to the economic database of the provider Genios - a subsidiary of the FAZ and the Handelsblatt. A hacker attack paralyzed the systems. The otherwise full Genios economic databases cannot currently be accessed. A single page only thinly announces “Our servers are currently unavailable! Due to a massive hacker attack, our servers are currently unavailable. We are working hard to solve the problem. We apologize for this and thank you for your understanding. Your GENIOS team”. Genios databases are not accessible Especially…

Read more

Why cybercriminals specifically target backups
Why cybercriminals specifically target backups AI - MS

There are two main ways to recover encrypted data after a ransomware attack: restoring from backups and paying the ransom. The attackers also know this and try to deprive companies of a solution by attacking backups. Two problems, same cause: Complete recovery of data after a ransom payment is highly uncertain, because in case of doubt you cannot rely on a promise from cybercriminals. And restoring the data from the backups doesn't work in many cases because the cybercriminals have often encrypted them in order to...

Read more

Tape storage as a valuable backup and cyber protection strategy
Tape storage as a valuable backup and cyber protection strategy AI - MS

When it comes to their backup recovery solution, many companies primarily focus on storage technologies that ensure high speed data recovery to maintain business continuity. That's why hard drives (including SSD) and the cloud play an important role. But the constant threat of a ransomware attack and technological developments also make tape essential. In the event of any kind of data loss - be it due to a technical failure, human error or an attack by cyber criminals - it is the backup recovery system that helps companies out of the unfortunate situation. To always have this lifeline...

Read more

Ransomware: Cybercrime groups increase ransom demands

As a new report shows, cybercriminals continue to rely on business email compromise in addition to ransomware and use long-known, unpatched vulnerabilities for attacks. The report shows that ransom demands are becoming increasingly outrageous. The Arctic Wolf Labs Threat Report was created based on threat, malware, digital forensics and incident response case data that Arctic Wolf collects across the security operations framework. It provides deep insights into the global cybercrime ecosystem, highlights global threat trends, and provides strategic cybersecurity recommendations for the coming year. Ransomware claims increase by 20% Cybercrime has increased in recent…

Read more

German companies: 4th place among global ransomware victims
German companies: 4th place among global ransomware victims - AI - Copilot

Check Point's Threat Intelligence Research Division (CPR) has released its 2024 Annual Cyber ​​Security Report. This year's edition focuses on the dramatic increase in ransomware attacks and the strategic use of AI in IT security. The report looks back on a year marked by significant turmoil and highlights a 90 percent increase in publicly blackmailed victims of ransomware attacks. Such ransomware attacks now account for 10 percent of all malware detected by Check Point's sensors. The Check Point Incident Response Team (CPIRT) also found that almost the…

Read more

Report shows SMEs in the crosshairs

Data and identity theft are the biggest threats to small and medium-sized businesses – SMBs. According to the Sophos Threat Report 50, almost 2023 percent of all malware cases analyzed targeted this market segment in 2024. Cybercrime is a challenge for organizations of all sizes, but small businesses are hit hardest and often under the public's radar. Sophos introduces its new Threat Report: Cybercrime on Main Street. This year the focus is on the biggest threats to small and medium-sized businesses (SMEs). Report: SMEs most threatened…

Read more

Cyber ​​threats: another record high in 2023
Cyber ​​threats: another record high in 2023

The number of cyber threats reached a record high in 2023. This is what Trend Micro’s Annual Cybersecurity Report shows. Trend Micro security systems detected and blocked malicious activity more than 161 billion times. The development of the past few years continues: since 2019, the number of threats has almost tripled to around 54 billion. The study also shows that cybercriminals are attacking more specifically, evolving their ransomware tactics and becoming more sophisticated. Companies should also urgently keep an eye on their cloud environments. Because the two most common cyber risks that Trend Micros Attack Surface Risk Management…

Read more

IT security: Basis for LockBit 4.0 defused
Trend Micro News

In collaboration with the UK's National Crime Agency (NCA), Trend Micro analyzed the in-development and unreleased version of the LockBit encryptor, rendering the entire product line unusable to cybercriminals in the future. As a criminal group, LockBit was known for innovating and trying new things. In the course of this innovative development, LockBit has released several versions of its ransomware, from version v1 (January 2020) to LockBit 2.0 (nicknamed “Red”, from June 2021) to LockBit 3.0 (“Black”, from March 2022). In October 2021, the Linux threat actor introduced…

Read more

MDR and XDR via Google Workspace
SophosNews

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings with it challenges when it comes to access to software services, servers and systems. Sophos has now integrated its security solutions into Google Workspace. To accommodate the cloud-based and collaborative way of working, Sophos has now integrated its solutions into Google Workspace to protect the business-critical productivity tools and data in the Google world from sophisticated attacks. Google Workspace (formerly G Suite) includes integrated security controls, the examination and validation of the resulting data and the response...

Read more