News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

2023: over 400.000 new malicious files per day
Kaspersky_news

It's just one manufacturer that's on the lookout for new malware around the clock: Kaspersky discovered an average of 2023 new malicious files per day in 411.000; this corresponds to an increase of almost three percent compared to the previous year. More than half (53 percent) of attacks involved malicious Microsoft Office and other types of documents. There has also been a significant increase in backdoor Trojans that can control infected systems - 40.000 discoveries were made every day this year. Kaspersky security solutions discovered an average of 2023 new malicious...

Read more

Microsoft can open encrypted ZIP files
Microsoft can open encrypted ZIP files

Security researchers have found that Microsoft is probably able to open and scan encrypted ZIP archives stored on Onedrive or Sharepoint - as long as they were created using Windows. There is no official information from Microsoft on the subject. It is a popular tool for cyber attacks via email: the attackers attach an encrypted ZIP file and security programs cannot scan the ZIP file. However, this does not seem to be the case for files created and encrypted under Windows. Accidental discovery: ZIPs are decrypted Some security researchers have accidentally discovered that…

Read more

Defense against phishing mails with dangerous QR codes
B2B Cyber ​​Security ShortNews

More and more phishing emails try to disguise their dangerousness by hiding dangerous links behind QR codes. This poses a growing threat to email security. Hornetsecurity is now using new technology to counter it. Cybersecurity provider Hornetsecurity is launching two new tools - QR Code Analyzer and Secure Links - to combat growing cyber threats. Hornetsecurity is thus reacting to the increasing number of fake QR codes and the ongoing threat of phishing, which accounts for 40 percent of all cyber attacks. QR code analysis and email link checks Research by Hornetsecurity Labs has shown that cybercriminals are increasingly…

Read more

Microsoft DCOM hardening tool discovers vulnerabilities
B2B Cyber ​​Security ShortNews

Open-source detection tool uncovers vulnerabilities in DCOM ahead of Microsoft's March 2023 patch. Users can quickly determine if their networks contain unsecured DCOM made unusable by the new Microsoft patch. OTORIO has released the open-source Microsoft Distributed Component Object Model (DCOM) Hardening Toolkit. The aim is to protect OT systems from possible problems related to an upcoming Microsoft patch. Because Microsoft itself writes: “14. March 2023, hardening changes are enabled by default with no option to disable them. At this point, you must resolve any compatibility issues with the hardening changes and applications in your environment." Test,…

Read more

UK scans entire country for cyber vulnerabilities 
B2B Cyber ​​Security ShortNews

The National Cyber ​​Security Center (NCSC), the UK's cyber security authority, is launching a vulnerability scan that will examine all of the country's internet systems for cyber vulnerabilities. If something is found, the authority informs the companies and operators. The authority in Great Britain informs that all systems in the country that can be reached via the Internet are subjected to a scan for cyber vulnerabilities. The rationale for this reads as follows: “As part of the NCSC mission to make the UK the safest place to live and do business online, we are producing a data-backed map of the UK's 'vulnerability'….

Read more

Security advisor against ransomware
Security advisor against ransomware

An improved security status reduces cyber risks, also with ransomware. Cohesity launches Security Advisor that scans the customer's Cohesity environment, including numerous security configurations. Cohesity, a leading provider of data management solutions, has launched Security Advisor. This extension of the threat defense architecture offers companies an easy way to improve their security posture in the face of sophisticated cyberattacks. You can use it to reduce human errors and increase the resilience of your surroundings, which are managed via the Cohesity Helios data platform. Security Advisor scans security configurations Security Advisor scans the customer's cohesity environment, including numerous security configurations. The solution takes into account ...

Read more

Does your current IT security concept work?

Automated cybersecurity checks make IT security that is becoming more complex more understandable. Large companies afford expensive tests of their IT security concept - what about less well-equipped medium-sized and small companies? In IT security, a kind of rabbit-hedgehog race has been taking place between well-organized cyber criminals and their possible victims for years. Highly sensitive targets of attack on IT infrastructures such as those of financial institutions, authorities, health facilities, energy suppliers, telecommunications service providers but also large companies have long been a lucrative target of hackers. All companies are one goal - including SMEs Due to their relevance for customers or the public and the large extent of damage in ...

Read more