News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Security risk from identity sprawl

Security risk from identity sprawl. As companies increasingly use new technologies such as the cloud, big data, DevOps, containers or microservices, this growing complexity also poses new challenges for identity and access management. With these emerging technologies, workloads and data volumes grow and increasingly reside in the cloud. This increases the number of human and machine identities exponentially. In order to contain these new attack surfaces, it is therefore essential to centralize fragmented identities across a hybrid company infrastructure and to enforce a consistent security model for privileged access. Identity Sprawl: The Dangers of Identity Sprawl With Identity Sprawl ...

Read more

ITSiG 2.0: System for attack detection becomes mandatory for KRITIS
ITSiG 2.0: System for attack detection becomes mandatory for KRITIS - critical infrastructure

On April 23, 2021, the Bundestag passed the revised IT Security Act (ITSiG 2.0). ITSiG 2.0, the attack detection system, becomes mandatory for KRITIS. Critical infrastructures have to set up a holistic attack detection system within two years. The supply chain becomes part of the IT Security Act. On April 23, 2021, the Bundestag passed the revised IT Security Act (ITSiG 2.0). In addition to expanded powers for the Federal Office for Information Security (BSI), cybersecurity requirements are being tightened. Critical infrastructures such as energy suppliers and water suppliers as well as waste disposal companies and large companies with economic importance will be dealt with with the amendment ...

Read more

Study: Warning Signs of Phishing Attacks

New Barracuda study reveals geographic and network warning signs of phishing attacks. The country email originated from and the number of countries it was routed through on its way to its final destination are major warning signs of phishing attacks. A new study by Barracuda in collaboration with Columbia University analyzed the geolocation and network infrastructure of more than 2 billion emails sent in January 2020, including 218.000 phishing emails. The research showed that phishing emails were more likely to come from certain countries in parts of Eastern Europe, Central America, the Middle East, and Africa. 2 billion…

Read more

Outlook appointments as a trap
B2B Cyber ​​Security ShortNews

Email addresses are verified by rejection - Outlook appointments as a trap. Currently, invitations to fake Outlook appointments are increasingly being sent. Anyone who reacts to this - replies, accepts or rejects - falls into the trap of data collectors who use this method to check whether e-mail addresses are active. There are currently more and more complaints about unwanted Outlook invitations to fake appointments. This is reported by the consumer advice center in Bremen. It is not necessarily obvious at first glance that it is spam. Hacked e-mail accounts are often used for sending and the appointment invitation can even come from one of your real contacts. To-…

Read more

0,4 million euros in damage per company
Extortion euro ransomware damage

A study on ransomware published by Sophos has shown that more than half of the medium-sized companies surveyed in Germany had been victims of ransomware in the last twelve months and that these companies suffered an average of more than 400.000 euros in damage due to the failure or restriction of business operations. A comment from Michael Veit, Technology Evangelist at Sophos. A cyber attack is no longer the exception, as it was in previous decades. It is the norm today and affects organizations of all sizes. The almost daily headlines about new ransomware attacks on large companies, hospitals ...

Read more

Update: Blocky ransomware protection for backups
B2B Cyber ​​Security ShortNews

In the new update for the ransomware protection for backups Blocky for Veeam® 2.5 with there is now an additional user-independent password protection. Cristie Data and GRAU DATA, who have had a close technology partnership since September 2019, are jointly presenting the latest version Blocky for Veeam® 2.5. The ransomware protection prevents the backup data from being encrypted and, in its new version, offers additional security features, including unauthorized access at administrator level. With an extended, integrated password security, companies can be sure that unauthorized actions are also prevented from the administration console. Even after the administrator has logged in ...

Read more

Update for TeamViewer Remote Management
Business access

TeamViewer Remote Management now also integrates web monitoring. The new monitoring module monitors the performance of websites and online shops and also notices overloading by possible attackers. TeamViewer, a global leader in secure remote connectivity solutions, today announced the launch of a web monitoring module as part of the existing "Remote Monitoring and Management" solution. The TeamViewer platform thus offers extended functionality for website administrators and operators of online shops, as they now have the option, in addition to monitoring and remote maintenance of the server, to check the availability and functionality of the website, thus minimizing downtimes and losses . Alone…

Read more

Protection against attacks on cloud apps
News B2B Cyber ​​Security

The discussions about the security of cloud computing have accompanied this technology from the start. Despite this discussion, cloud computing is ubiquitous today, and almost all organizations use the services of a cloud provider. It stands to reason that cyber criminals have developed special attack methods for cloud applications. Proofpoint forensic experts recently analyzed data from more than 1.000 cloud service customer accounts with a total of more than 20 million user accounts. Matching articles on the topic

Read more