News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​Threats: New Tactics and Trends
Cyber ​​Threats: New Tactics and Trends

Remote access to company networks is increasing and with it cyber threats are increasing. Cybercriminals are constantly developing their attack tactics. As companies' internal cybersecurity becomes more protected and monitored, cybercriminals have evolved their tactics and are focusing on new methods of compromise that provide a larger attack surface than ever before. This means organizations must look beyond their traditional IT boundaries to understand the full scope of threats that could lead to a cyber incident. External threats To better understand this expanded attack landscape, continuous...

Read more

Dark Web: just $2.000 for enterprise access 
Kaspersky_news

Kaspersky experts analyzed around 200 offers on the dark web that offer access to companies. They have found that the average cost of accessing a large company's systems is between $2.000 and $4.000. This amount is quite small compared to the potentially very large damage to the attacked companies. Such services are of the greatest interest to ransomware operators, whose profits can reach up to $40 million per year. Dark Web: high demand for data Kaspersky research shows that the Dark Web is not just a…

Read more

MS Exchange vulnerability is cybercrime driver
Eset_News

ESET Threat Report: MS Exchange Vulnerability is Cybercrime Driver. European IT security manufacturer continues to register a high level of attacks on home office workstations and cryptocurrencies. What are the current security threats to home and business? What are the current activities of the hacker groups? The ESET Threat Report regularly provides answers to these and other questions. The main topic of the latest report is the latest findings by ESET researchers about the vulnerability affecting Microsoft Exchange Server. The COVID-2021 pandemic as a topic of large-scale cybercrime campaigns subsided in the first four months of 19. In addition, there are exclusive updates on the ...

Read more

247 million RDP brute force attacks in 12 months 
Kaspersky_news

Millions of people have been working from home for a year. In the course of this, the use of remote access tools has increased enormously - and with it a massive increase in brute force attacks against the Remote Desktop Protocol (RDP), one of the most popular remote access tools for workstations and servers. In such attacks, cyber criminals test different usernames and passwords until they find the right combination and then get remote access to the computer within the network; possible consequences: espionage or theft of information. Remote desktop attacks remain high Even at the beginning of the corona pandemic ...

Read more

Home office attacks: RDP attacks increase by 4.516 percent
Eset_News

Home offices under attack: RDP attacks increase by 4.516 percent. Corona pandemic and lockdowns in the DACH region have led to an explosive increase in attacks on the protocol. Cyber ​​criminals in Germany, Austria and Switzerland have massively targeted companies and their employees in the home office. In December 2020 alone, the European IT security manufacturer ESET registered an average of 14,3 million attacks on the remote desktop protocol (RDP for short) in these three countries every day. In January there were only 310.000. Especially with the second lockdown as a result of the corona pandemic and the efforts of politicians to get as many employees as possible ...

Read more

Java malware copies passwords
G Data News

G Data researchers reveal: Java malware copies passwords and also enables remote control via RDP. A newly discovered malware developed in Java can copy access data, remotely control the victim's computer and execute other commands. The integrated ransomware component is not yet fully functional. G DATA CyberDefense analysts warn of new malware developed in Java. If the malware is active on a system, criminals can read passwords from browsers and the e-mail program. Since the malware has a remote access function (RAT), an attacker can also remotely ...

Read more