News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Report: Expectations vs. Reality in Third Party Risk Assessments
Report: Expectations vs. Reality in Third Party Risk Assessments

Data protection, access management, cloud security, incident detection and handling and business continuity: CyberVadis study reveals potential gaps that lead to an increased third party risk. CyberVadis, a leading company for third party cybersecurity risk assessments, has published a new study to analyze the cybersecurity measures declared by companies in comparison to the evidence-based assessments from CyberVadis. The report focuses on five key areas of cybersecurity - data protection, access management, cloud security, incident detection and handling, and business continuity - to uncover potential loopholes that could lead to increased third party risk from uncertified assessments….

Read more

Microsoft Exchange: Attackers scan for ProxyShell
G Data News

Attackers are currently targeting a number of vulnerabilities known as “ProxyShell”. The vulnerabilities have been closed since April and May. G Data recommends that companies affected patch their Exchange servers immediately. Around the BlackHat security conference, which takes place annually in Las Vegas, security researchers often publish previously unknown security gaps - this year too: three vulnerabilities in Microsoft Exchange are once again causing work in companies that operate an Exchange server locally. The names are: CVE-2021-34473 CVE-2021-34523 CVE-2021-31207 “The attacks by the Hafnium group on local Exchange servers in March of this year ...

Read more

Conference: Identify and eliminate security vulnerabilities
B2B Cyber ​​Security ShortNews

From September 28th to 30th, 2021, the Stralsund University of Applied Sciences will hold the IT security conference with the topic "Detecting and eliminating security vulnerabilities". The digital event is free. How to deal with security vulnerabilities in computer networks? What is the overall situation with IT security in Germany and Europe? What is it about movement profiles from social networks? The constant technical progress in the IT area offers a sponge of outstanding possibilities, but also of hidden as well as obvious dangers. In half-hour, concise lectures from September 28th to 30th, 2021, the...

Read more

CodeSentry to identify security vulnerabilities

GrammaTech presents a new version of the CodeSentry tool for identifying security gaps in third-party code. CodeSentry 2.0 uses binary analysis to create a software bill of materials, uncover zero-day and n-day security gaps, and determine a risk score for third-party software applications. GrammaTech, a leading provider of software tools for static code analysis and for the detection of security vulnerabilities, announces the availability of Version 2.0 of CodeSentry. Identifying and avoiding security risks CodeSentry is a solution for identifying and avoiding security risks within the software supply chain. The new CodeSentry 2.0 version offers, among other things, the option of using the Executive Dashboard to ...

Read more

Exchange: New vulnerabilities discovered and closed
G Data News

In mid-April there were again some critical updates for Microsoft Exchange. As with hafnium, experts strongly advise installing the patches. Unlike with hafnium, however, the warning came from the American NSA. On patch day in mid-April, Microsoft closed two critical security holes that affect locally installed instances of Exchange 2013, 2016 and 2019. These security vulnerabilities allow arbitrary program code to be executed on an affected system. In contrast to the security vulnerabilities that the Hafnium group used, there are currently no signs, according to Microsoft, that the vulnerabilities are active ...

Read more