News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyberattacks via API
Cyberattacks via API

In the first month of 2024, the frequency of API attacks has increased, affecting an average of 1 in 4,6 companies per week - a 20 percent increase from January 2023. This upward trend, reported by Check Point Research in the Check Point ThreatCloud AI Data observed highlights the urgent need for robust API security strategies. Significant increase in attacks: In the first month of 2024, 1 in 4,6 companies worldwide were affected by attacks on web APIs each week, a 20 percent increase compared to January 2023 and the growing…

Read more

Dangerous misconception: “We have no IT vulnerabilities”

“We have taken good precautions and I believe that we are well protected.” This often-uttered sentence creates a false sense of security. Although many companies have invested in cybersecurity, they only find out in an emergency whether security resilience actually delivers what it promises in all areas. IT security vulnerability assessments and penetration tests are more important than ever. Studies like the current Sophos Threat Report show that, despite all efforts, there are still too many loopholes for cybercriminals. Almost 50 percent of all malware cases analyzed targeted small and medium-sized companies...

Read more

BSI: Thousands of MS Exchange servers with critical vulnerabilities
BSI: Thousands of MS Exchange servers with critical vulnerabilities - Ki - Bing

The BSI – Federal Office for Information Security – has warned several times in the past about vulnerabilities in Exchange and recommended that the security updates provided be installed promptly. But old systems are still not patched and a new vulnerability has already been published. There are currently around 45.000 Microsoft Exchange servers in Germany operating with Outlook Web Access (OWA) that can be accessed openly from the Internet. According to the BSI's findings, around 12% of these are still running Exchange 2010 or 2013. Security updates have no longer been available for these versions since October 2020 or April 2023...

Read more

Vulnerabilities in medical devices
B2B Cyber ​​Security ShortNews

One in four medical devices (23%) has a vulnerability from the US cyber security agency CISA's Known Exploited Vulnerabilities (KEV) catalog. In addition, almost two thirds (63%) of KEVs are found in medical networks. In the first healthcare-focused edition of the State of CPS Security Report, Team82, Claroty's research arm, examines the impact of increasing connectivity in medical devices. The aim of the report is to demonstrate the comprehensive connectivity of critical medical devices - from imaging systems to infusion pumps - and shed light on the associated risks. As part of the investigations…

Read more

Report highlights cyber threats to automotive industry
Report reveals cyber threats to automotive industry

Cyber ​​Threats: The 2023 VicOne Automotive Cyberthreat Landscape Report identifies the supply chain as the primary target of increasing cyberattacks on the automotive industry. This also shows a list of cyber-based trends and incidents that have threatened the automotive industry. VicOne has unveiled its new Automotive Cyberthreat Landscape Report 2023. The comprehensive annual report on cyber threats across the automotive industry is based on data from automotive original equipment manufacturers (OEMs), suppliers and dealers worldwide and includes the following key points: Evidence of growing use and monetization of automotive data - and the associated risk of exploitation by cybercriminals A list…

Read more

Centralized vulnerability detection platform
Centralized Vulnerability Detection Platform - AI MS

Horizon IOC: Check Point integrates a new platform into its IT security architecture. This means there is now central management of vulnerability detection for Horizon XDR/XPR and Playblocks. The innovative platform fits seamlessly into the Horizon architecture and can be easily integrated into the Horizon XDR/XPR and Playblocks products. The latter fill Horizon IOC automatically after the integration. With their help, Indicators of Compromise (IOC) can be evaluated much more easily than before. Consolidating data into one point Horizon IOC merges data from various sources, including other Check Point products, SOC teams, and…

Read more

Vulnerabilities in critical infrastructures
B2B Cyber ​​Security ShortNews

A global leader in cybersecurity solutions, today released “SIERRA:21 – Living on the Edge,” an analysis of 21 newly discovered vulnerabilities in OT/IoT routers and open source software components. The report was written by Forescout Research – Vedere Labs, which specializes in uncovering security vulnerabilities in critical infrastructure. The analysis highlights the ongoing risk to critical infrastructure and highlights possible mitigation measures. “SIERRA:21 – Living on the Edge” describes research on Sierra Wireless AirLink cellular routers and a number of associated open source components such as TinyXML and OpenNDS. Sierra Wireless Routers Are Popular: An Open Database on Wi-Fi Networks…

Read more

Researchers hack encrypted Bluetooth connections
B2B Cyber ​​Security ShortNews

Researchers at Eurecom University in the south of France have discovered Bluetooth vulnerabilities and developed attacks for them. The so-called “BLUFFS” can be used to break into Bluetooth sessions, spoof the device identity and carry out man-in-the-middle attacks. The “BLUFFS” attacks by Eurecom researchers are tough: they rely on vulnerabilities in the structure of Bluetooth. Daniele Antonioli, Assistant Professor at Eurecom University, has discovered the possibilities for Bluetooth attacks that exploit previously unknown vulnerabilities in the Bluetooth standard. The vulnerabilities relate to how session keys are derived to decrypt data in exchange. Weak points in the Bluetooth architecture The defects found…

Read more

Veeam ONE: Hotfix for critical vulnerabilities is available 
B2B Cyber ​​Security ShortNews

Veeam is informing its users about two critical and two medium vulnerabilities in Veeam One for which patches are already available. The critical gaps have a CVSS v3 value of 9.9 and 9.8 out of 10. Those responsible should therefore act immediately. The vulnerabilities with the code CVE-2023-38547 and CVE-2023-38548 describe a high level of danger in Veeam ONE. The following versions are affected: Veeam ONE 12 P20230314 (12.0.1.2591) Veeam ONE 11a (11.0.1.1880) Veeam ONE 11 (11.0.0.1379) Two critical vulnerabilities in Veeam One The first vulnerability CVE-2023-38547 with a CVSS v3.1. 9.9:XNUMX in Veeam ONE allows an unauthenticated user to…

Read more

Identify vulnerabilities faster – reduce cyber risks
Reduce cyber risks: Tanium announces new modules

Tanium's new modules help you identify vulnerabilities more quickly and improve digital employee experiences. All of these points reduce cyber risks for companies. Tanium, endpoint management specialist, has added new Tanium Digital Employee Experience (DEX) features to its platform. This is a new module for XEM Core. The new products, features and updates are designed to expand Tanium's core capabilities and improve its performance and usability. The new features include: How the new functions for DEX automatically solve problems with digital…

Read more