News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Difficult task: network security across multiple locations
Difficult task: Network security across multiple locations - Image by Gerd Altmann on Pixabay

For companies and their security managers, network security at distributed locations is a tricky task. As a Kaspersky report shows, more than every second company sees distributed protection as a major challenge. For decision-makers in companies in Germany, managing and protecting networks that connect multiple locations is an increasing challenge: they see the development of a coherent IT infrastructure (2 percent) and the protection of all information (58 percent) as the greatest challenges. These results emerge from the current Kaspersky report "Managing geographically distributed businesses: challenges and solutions". A connected world brings...

Read more

CISOs under pressure: Should downplay cyber risks
CISOs under pressure: Should downplay cyber risks Image: MS - KI

The study results on dealing with cyber risks in companies are quite impressive. The Trend Micro study shows: Three quarters of German IT security managers (76 percent, 79 percent worldwide) feel under pressure from management to downplay cyber risks in the company. An important statement: 48 percent (41 percent worldwide) of them believe that only a serious security incident in the company would prompt management to take more decisive action against cyber risks. Why aren’t CISOs being heard? 49 percent of those surveyed in Germany (42 percent worldwide) believe that they are considered excessively negative. 32 percent (worldwide…

Read more

Passkey support for mobile devices
Passkey support for mobile devices MS - AI

Zero-trust and zero-knowledge credential protection provider Keeper Security announces support for passkey management for iOS and Android mobile devices. This means there is cross-platform functionality for both passkeys and traditional passwords. This gives SMEs in particular access to a professional solution. With Keeper, passkeys are created, stored, and managed in the Keeper Vault and can be used to easily log in to websites and applications across all browsers and operating systems. As long as the user has access to their Keeper Vault, they can access their passkeys,…

Read more

For businesses: Browsers with identity-based protection
For businesses: Browsers with identity-based protection MS - AI

Now it's available: The CyberArk Secure Browser for companies. It is the first browser to offer greater security and privacy with identity-based protection, combining both with a familiar, productive user experience. The CyberArk Secure Browser relies on intelligent permission controls and can be easily deployed on a variety of devices. It was developed specifically for a cloud-first world and enables secure access to on-premises resources and SaaS applications. The browser provides security teams with unparalleled visibility, control and governance, helping to prevent the misuse of compromised identities, devices and credentials...

Read more

Why cybercriminals specifically target backups
Why cybercriminals specifically target backups AI - MS

There are two main ways to recover encrypted data after a ransomware attack: restoring from backups and paying the ransom. The attackers also know this and try to deprive companies of a solution by attacking backups. Two problems, same cause: Complete recovery of data after a ransom payment is highly uncertain, because in case of doubt you cannot rely on a promise from cybercriminals. And restoring the data from the backups doesn't work in many cases because the cybercriminals have often encrypted them in order to...

Read more

Intruders in your email inbox
Email as a primary attack vector

Automated email inbox rules are a useful and familiar feature of most email programs. They help manage your inbox and the daily flood of wanted and unwanted messages by allowing you to move emails to specific folders, forward them to colleagues when you're away, or delete them automatically. However, once an account has been compromised, attackers can abuse inbox rules to disguise further attacks, for example by secretly exfiltrating information from the network via forwarding, ensuring that the victim does not see security warnings, and deleting certain messages. E-mail…

Read more

DDoS: Protection against cyberattacks with automated real-time analysis
DDoS: Protection against cyberattacks with automated real-time analysis

NETSCOUT has introduced its Adaptive DDoS Protection for its Arbor® Threat Mitigation System (TMS). The system improves the detection of distributed attacks that dynamically change vectors and target numerous IP addresses simultaneously, including carpet bombing. NETSCOUT ASERT, the company's expert security research and DDoS attack defense team, has documented a significant increase in dynamic distributed denial of service (DDoS) attacks that utilize multiple vectors and techniques to attack botnet-based, direct-to-consumer attacks. To launch path, state exhaustion and application layer attacks. These are designed to bypass traditional static network and cloud-based DDoS defenses. Carpet bombing attacks have increased by more than 110%...

Read more

iOS 16: Simulated flight mode as a hidden hack
iOS 16: Simulated flight mode as a hidden hack - Photo by Sten Ritterfeld on Unsplash

Jamf Threat Labs has developed a technique on iOS16 that can simulate airplane mode. In concrete terms, this means that hackers could exploit this opportunity to trick the victim into thinking that the device's flight mode is turned on. However, malware is working in the background. The attacker actually installed an artificial flight mode (after successfully using an exploit on the device). This changes the user interface so that the airplane mode symbol is displayed and the Internet connection to all apps is interrupted - except the application that the hacker wants to use. The technology has probably not yet been used by malicious...

Read more

Email blackmail on the rise

In extortion emails, cybercriminals threaten to publish compromising information about their victims, such as an embarrassing photo, and demand payment in cryptocurrency. Attackers often purchase victims' login credentials or obtain them through data breaches to "prove" that their threat is legitimate. To gain a better understanding of the financial infrastructure attackers use in extortion emails, Barracuda partnered with researchers at Columbia University to analyze over 300.000 emails captured by Barracuda Networks' AI-based detectors over a period of one year year when extortion attacks were detected. Below are the…

Read more

Zero Trust: Endpoint agents as a VPN replacement
Endpoint agents as a virtual private network replacement - Image by Gerd Altmann on Pixabay

Organizations can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. New endpoint agents for macOS and Windows serve as a complete replacement for traditional virtual private networks. Lookout has announced new Windows and macOS endpoint agents for its Lookout Secure Private Access Zero Trust Network Access (ZTNA) solution, facilitating the complete replacement of overburdened virtual private networks (VPNs) with cloud-based security. Enterprises can now take full advantage of the benefits of a zero trust architecture while dramatically simplifying network design. According to analysts at Gartner, by…

Read more