News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware attacks: via remote device into the network
Ransomware attacks: via remote device into the network - AI

Successful ransomware groups are increasingly switching to remote encryption, according to Sophos' latest CryptoGuard report. The problem: traditional anti-ransomware protection does not “see” the disaster coming and is ineffective. The type of attack has increased by 62 percent. Sophos has published its new report “CryptoGuard: An Asymmetric Approach to the Ransomware Battle” with the evaluations of its CryptoGuard defense technology. The most successful and active ransomware groups such as Akira, ALPHV/BlackCat, LockBit, Royal or Black Basta are consciously switching to remote encryption for their attacks. With this so-called “remote ransomware”, cybercriminals use a compromised and often poorly protected device to steal data on other…

Read more

Zero-trust remote access solution for secure hybrid working
Zero-trust remote access solution for secure hybrid working - image by Franz Bachinger on Pixabay

The new LANCOM Trusted Access Client enables secure and scalable network access for employees in the office, at home or on the go, thereby protecting modern hybrid working from anywhere and at any time. Through complete integration into the LANCOM Management Cloud, commissioning and configuration are “zero-touch” for easy and quick rollout of new remote access connections. The LANCOM Trusted Access solution dynamically adapts to increasing security requirements. Zero trust from SMEs to enterprises LANCOM Trusted Access supports both classic full network access as a VPN client as well as the migration to a zero trust security architecture with...

Read more

BYOD: security and privacy when working remotely
BYOD: security and privacy when working remotely - Image by Mircea - All in collections on Pixabay

With the unprecedented rise of mobile devices, Bring Your Own Device (BYOD) has become a convenient way of everyday work to access email and other digital data outside of the office. But what about security and privacy? Even those who do not have a business cell phone are often willing to use their private cell phone or tablet to be productive outside of the office. Of course, BYOD also brings new security risks. Even before the pandemic, companies were struggling with the trade-off between employees wanting to work remotely and…

Read more

Critical vulnerabilities in Lexmark printers
B2B Cyber ​​Security ShortNews

The manufacturer of corporate printers Lexmark has once again warned its users of critical vulnerabilities. In dozens of its models there are four vulnerabilities in the firmware with a CVSSv3 score of 9.0, one 8.5 and one 8.0 out of 10. Users should update the firmware accordingly. A few weeks ago, Lexmark had to ask many of its users to update the firmware for many of its printers. Now there is already a large number of dangerous vulnerabilities. The update is recommended for companies and administrators, as the CVSSv3 values ​​​​are 9.0 out of 10 in four cases and are classified as critical…

Read more

70 percent of XIoT vulnerabilities critical or high
70 percent of XIoT vulnerabilities critical or high

The new State of XIoT Security Report: 2H 2022 shows that 71 percent of vulnerabilities were rated with a CVSS v3 score of “critical” (9,0-10) or “high” (7,0-8,9). Almost two-thirds of XIoT vulnerabilities can be exploited remotely. Vulnerabilities in cyber-physical systems that became known in the second half of 2022 have decreased by 2021 percent since the peak in the second half of 14. At the same time, vulnerabilities discovered by internal research and product security teams have increased by 80 percent over the same period. Sharp increase in XIoT vulnerabilities This is shown by the new State of XIoT Security Report: 2H…

Read more

Remote work risk: Employees without cybersecurity training
Remote work risk: Employees without cybersecurity training

A new study by Hornetsecurity has found that 33% of companies do not conduct any cybersecurity training for users working remotely. The lack of knowledge increases the risk. The study also reveals that nearly three-quarters (74%) of remote workers have access to critical data, posing a greater security risk for organizations in the new, increasingly hybrid workforce. Challenges and Risks The independent survey, which included 925 IT professionals from various industries and company sizes worldwide, also identified the challenges for security management and the risks for…

Read more

VPN gateway appliance and Wi-Fi 6 for remote work

Regardless of location, companies can connect all users with enterprise-grade security: WatchGuard's Firebox NV5 VPN gateway appliance and AP6CR Wi-Fi 332 access point ensure secure remote workplaces and outdoor environments. With two new products, the NV5 VPN Gateway Tabletop Appliance and the outdoor Wi-Fi 6 Access Point AP332CR, WatchGuard expands its powerful range of security products and services for enterprises and Managed Services Providers (MSPs) looking for are looking for IT security solutions to support a wide range of decentralized workplace scenarios. This gives users seamless protection wherever they are. More…

Read more

Vulnerability in Netgear router allows external access
Tenable news

Tenable has discovered a vulnerability in a new NETGEAR router. The popular WiFi 6 router is known for its large area coverage and is also used by micro-businesses. The router can be reached from the outside with an old firmware via IPv6. Tenable's ZeroDay research team found a network misconfiguration in the NETGEAR Nighthawk WiFi6 Router (RAX30 AX2400) working with firmware up to v1.0.7.78. The new update with firmware V1.0.9.90 fixes the security problem. External attack via IPv6 possible The bug inadvertently enabled unrestricted communication with all services running over IPv6 on the WAN (Internet Facing) port of the…

Read more

Remote maintenance software with SSL & TLS for more security
Remote maintenance software with SSL & TLS for more security

ProSoft announces a new version of its NetSupport Manager remote maintenance software with enhanced security features. Version 14 offers more flexibility and security through gateway encryption with SSL/TLS certificates. IT security expert and Trusted Advisor ProSoft presents the new major release v14 of NetSupport Manager - a high-speed solution for secure remote maintenance and remote control of servers, workstations and smart devices from the UK software developer of the same name. As a NetSupport Premier Partner, ProSoft offers training, support and consulting in addition to the software. "The cross-platform remote control software solution now includes a whole range of new and improved features to minimize support time...

Read more

Secure and seamless remote access 
B2B Cyber ​​Security ShortNews

With the latest version of its proven Connection Manager, Delinea, the specialist in Privileged Access Management (PAM) solutions for seamless security, has sustainably optimized the administration and protection of remote connections. Customers now benefit from more flexibility and a reduction in friction losses, which can also reduce threats such as ransomware. This is all the more important since, according to the Verizon 2022 Data Breach Investigations Report, compromised credentials are the attack vector of choice for cybercriminals and are also a major cause of ransomware attacks. These have increased by 13 percent in the past year and now make up 25 percent of the…

Read more