News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Data protection: find sensitive data in Microsoft 365, AWS or Google
B2B Cyber ​​Security ShortNews

In addition to sensitive data, the secrets in companies also include stored information on access data, API keys or passwords on drives or in the cloud at AWS, Microsoft 365 or Google. To track down and classify these "secrets" in the corporate environment, Varonis now offers Secrets Discovery. With increasing cloud usage and ever faster app development, secrets, i.e. confidential information such as API keys or passwords, can end up almost anywhere and reveal intellectual property, source code and critical infrastructure. Accordingly, open secrets are increasingly responsible for devastating data breaches. The new data classification possibilities from Varonis Systems, Inc. the specialists...

Read more

New zero-day vulnerabilities are attacked after 15 minutes 
New zero-day vulnerabilities are attacked after 15 minutes

Administrators only have a short window of 15 minutes to 10 hours after the notification of new zero-day vulnerabilities to provide their systems with security updates, a study shows. Attackers are getting faster and faster when it comes to exploiting new zero-day vulnerabilities. This is shown by a study by Palo Alto Networks, for which around 600 security incidents were analyzed. On average, it takes only 15 minutes after a new zero-day security vulnerability is reported for criminals to actively search the Internet for vulnerable systems. So have some of the hardest zero-day vulnerabilities of the past year, including…

Read more

Log4j: Kaspersky registers 30.000 scans for vulnerabilities
Log4j Log4shell

Although the Apache Foundation released a patch shortly after the discovery of Log4j / Log4Shell, this vulnerability continues to pose a major threat to consumers and businesses. Kaspersky products blocked 30.562 attack attempts in the first three weeks of January. The vulnerability is extremely attractive to cyber criminals as it is easy to exploit and allows them to take complete control over the victim's system. Log4j: Kaspersky already blocked over 150.000 attacks Since initial reporting, Kaspersky products have detected and blocked 154.098 attempts to scan and attack devices by targeting…

Read more

Log4j alarm: heat maps show attempted attacks and scans
SophosNews

Sophos registers the scans for Log4j vulnerabilities worldwide and the countries from which many exploits come: China and Russia. The findings show two heatmaps. Sean Gallagher, Senior Threat Researcher at Sophos “Sophos continues to monitor scans for Log4j vulnerabilities. In the past, we've seen large spikes and then sharp drops in such scans and exploit attempts. In the case of Log4j, we didn't see a drop, but rather daily scans and access attempts from a globally distributed infrastructure. We expect this high level of activity to continue as the vulnerability...

Read more