News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cloud: fix security risks with one click
B2B Cyber ​​Security ShortNews

One-click cloud misconfiguration fix is ​​a critical enabler for Data Security Posture Management (DSPM). Varonis Introduces Automated Posture Management to Remediate Cloud Security Risks. The new automated posture management from Varonis, the specialists in data-centric cybersecurity, helps companies to easily remediate security and compliance gaps in their SaaS and IaaS environments: Varonis continuously scans, detects and prioritizes cloud security risks and provides CISOs, Security and compliance officers real-time insight into their data security posture. With the new automation feature, they can now automatically fix misconfigurations in applications like Salesforce and AWS using a single…

Read more

Reduce security risks in Microsoft 365
B2B Cyber ​​Security ShortNews

Introduction of "Vectra Protect" helps companies to reduce security risks in Microsoft 365. Businesses can request a free security analysis for their cloud tenants. Vectra AI, a leading provider of AI-powered threat detection and response for hybrid and multi-cloud enterprises, announces the launch of Vectra Protect. The posture management tool is designed to detect and mitigate vulnerabilities in Microsoft 365 (M365). Vectra Protect combines more than 50.000 hours of research and development with automation to analyze an organization's M365 security posture and create tailored implementation plans to remediate risks. To ensure that all companies –…

Read more

API sprawl: High costs and security risks 
F5 news

The rapid proliferation of APIs (interfaces) and the associated governance and security risks could spiral out of control. The F5 study “Continuous API Sprawl: Challenges and Opportunities in an API-Driven Economy” warns of this. According to this, there are currently around 200 million APIs that are used for Internet applications ranging from digital payments to online entertainment to the smart home. By 2030, that number could rise to 1,7 billion. From 200 million APIs to 1,7 billion Even more problematic than growth is the widespread distribution of APIs without common standards, strong governance, or sufficient focus...

Read more

Risk: Empty offices due to the pandemic
Risk: Empty offices due to the pandemic

What are the risks lurking in computers, networks, offices and buildings abandoned by a pandemic? IT security officers had their hands full in the pandemic to securely connect the home office. But there are also risks in abandoned offices or workstation computers that have not been started up for a long time. Many employees fled to the home office at the beginning of the pandemic - and have stayed there to this day. They left IT systems and networks in the office next to their desk. The unused buildings cost money and are a real risk. Was someone able to break a lock during the pandemic, enter ...

Read more

Connected cars vulnerable to cyberattacks
Connected cars vulnerable to cyberattacks

Trend Micro publishes a new study on the safety of connected cars. This describes various cyber attacks and cyber risks that endanger the safety of the driver and others. The researchers evaluated 29 real attack scenarios using the DREAD threat model for qualitative risk analysis. These attacks can be launched remotely and / or from the victims' vehicles. The study lists the following examples: Evaluated attack scenarios DDoS attacks on Intelligent Transportation Systems (ITS) can influence the communication of the networked vehicle and represent a high risk. Exposed and vulnerable connected car systems are easy to discover, which means that ...

Read more

Dangers from social media app Clubhouse
Trend Micro News

The hype surrounding the new Clubhouse social media app continues unabated. But what about the security of the audio-only app if you use well-known people such as politicians, company bosses or employees in high positions? Comment from Udo Schneider, IoT Security Evangelist Europe at Trend Micro. Audio-based social media apps such as Clubhouse, HearMeOut or Audlist are very popular with users, but they are associated with some security risks. Cyber ​​criminals take advantage of this by targeting weak points in the system quickly and easily with mostly automated attacks. Some security risks of audio-based social media apps overlap with ...

Read more

Study: Cyber ​​attacks use tools
Cyber ​​attack

Kaspersky reports: In 25 percent of cyber attacks in Europe, cyber criminals misuse legitimate tools for their further activities. They mostly use program vulnerabilities as gateways into the company network or remote access tools to steal data. 11,1 percent of incident responses in Europe come from Germany; 25,9 percent from Switzerland. Whether financial institutions or companies from telecommunications, industry, transport and logistics - European organizations in all sectors are struggling with cyber attacks. Almost a quarter (24 percent) of the incident responses analyzed by Kaspersky worldwide last year concerned Europe, which is place ...

Read more

Software development creates weak points
Trend Micro News

Trend Micro introduces the application security risks and safeguards. Developers who work in traditional development teams tend to think about security after the fact because they focus too much on building applications and meeting deadlines. Applications play an integral role today and many businesses and users rely on a wide range of applications for work, education, entertainment, retail, and other purposes. Therefore, development teams play a key role in ensuring that applications provide users with a high level of usability, performance, and security from threat actors who ...

Read more