News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

CISA supplies ESXi Args Recover tool for data recovery
B2B Cyber ​​Security ShortNews

During the severe cyber attacks on thousands of older, unpatched VMare ESXi servers, many virtual machines were infected and encrypted with the ESXiArgs ransomware. ESXiArgs-Recover is a CISA tool that has already been able to recover data in some cases. CISA is aware that some companies have reported successful file recovery without paying a ransom. CISA compiled this tool based on publicly available resources, including a tutorial by Enes Sonmez and Ahmet Aykac. This tool reconstructs virtual machine metadata from virtual disks that were not encrypted by the malware….

Read more

Cyber ​​attack on Potsdam administration
B2B Cyber ​​Security ShortNews

Potsdam, the capital of the state of Brandenburg, was again the victim of a cyber attack. Those responsible have cut all of the administration's Internet connections. Since the whole thing already happened in 2020, you should actually be well prepared. At the moment, nothing is going on in the Potsdam administration of the state capital of Brandenburg. Another cyber attack was successful and probably paralyzed everything for the first time. Officials say: “As a precaution, the state capital of Potsdam switched off the administration’s Internet connection today and can therefore no longer be reached by e-mail with immediate effect.” All systems…

Read more

Microsoft Azure: 65.000 customer data freely available
B2B Cyber ​​Security ShortNews

SOCRadar found that 65.000 pieces of sensitive customer data became public due to a misconfigured Microsoft Azure Server. The leak includes Proof-of-Execution (PoE) and Statement of Work (SoW) documents, user information, product orders/offers, project details, PII (Personally Identifiable Information) data, and documents that may reveal intellectual property. SOCRadar's built-in cloud security module monitors public buckets to detect any exposure of customer data. Among the many public buckets discovered, six contained large-scale information for more than 150.000 companies in 123 different countries. The leaks are collectively dubbed BlueBleed by SOCRadar to reflect the information around them...

Read more

Exchange Server: New 0-day vulnerability - missing patches  
B2B Cyber ​​Security ShortNews

GTSC security researchers have discovered two new RCE vulnerabilities in MS Exchange Server. There are already suitable exploits for this in the wild. Microsoft was notified of the vulnerabilities and commented “Currently Microsoft is aware of limited targeted attacks”. Around early August 2022, while conducting security monitoring and incident response services, the GTSC SOC team discovered that a critical infrastructure was under attack, specifically their Microsoft Exchange application. During the investigation, GTSC Blue Team experts determined that the attack exploited an unpublished Exchange vulnerability (a 0-day vulnerability) and therefore immediately developed a temporary containment plan. At the same time, the experts began…

Read more

Protecting Servers from Cyber ​​Attacks: Free Best Practices E-Book
Protecting Servers from Cyber ​​Attacks: Free Best Practices E-Book Server Access Security

Delinea publishes free e-book “Conversational Server Access Security” with valuable best practices for “protecting servers from cyber attacks”. Delinea, a leading provider of Privileged Access Management (PAM) solutions for seamless security, is releasing “Conversational Server Access Security”, a new free e-book that offers companies valuable best practices for securing hybrid infrastructures. The guide, published in cooperation with Conversational Geek, shows how to successfully implement a Zero Trust approach to sustainably reduce cyber risks. Servers are always targeted Servers are the heart of the IT infrastructure and are often targeted by cybercriminals…

Read more

Review: 18 Enterprise Endpoint Security Software 2022
B2B Cyber ​​Security ShortNews

AV-Comparatives has published a review of 18 enterprise endpoint protection solutions: “Enterprise Endpoint Security Software 2022”. The test on Windows 10 64 took place in March and April 2022. The result shows some differences in performance. The independent ISO-certified laboratory for evaluating security software AV-Comparatives has published the latest results of the Business Main-Test Series, in which a number of anti-virus products are evaluated in corporate environments. This results report is a precursor to the full report that will be released in July and will include a performance test and the product reviews. 18 corporate products in…

Read more

Securely erase sensitive data on Windows 11
B2B Cyber ​​Security ShortNews

If old computers are discarded, business data can easily fall into the wrong hands and thus become public. Because deleting is not the same as "deleting". O&O SafeErase 17 also securely deletes sensitive data under Windows 11. SafeErase Admin Edition is suitable for data deletion on all PCs and servers in the company. O&O SafeErase allows you to securely delete and overwrite your data using recognized deletion methods so that reconstruction, even with special software, is no longer possible! The deletion of the entire computer including the system partition is possible without boot medium....

Read more

Log4j alert: ESET blocks hundreds of thousands of attacks on servers
Eset_News

The statistics with recorded attack attempts show that ESET has already blocked hundreds of thousands of attacks on servers related to Log4j / Log4Shell. Most of the attack attempts take place in the USA - Germany is in fourth place, as an interactive map shows. ESET has further analyzed the attempted attacks on IT systems that target the Log4j / Log4Shell security gap. ESET researchers still consider the vulnerability to be highly problematic as many computers still did not receive the required security updates. Therefore, ESET is assuming a ...

Read more

Dangerous: Tor2Mine Cryptominer with new variants
SophosNews

Sophos describes new variants of the Tor2Mine Cryptominer with new variants that are characterized by improved bypass, persistence and dissemination capabilities. If he is found in the network, he is usually not traveling alone. The Sophos analysis "Two flavors of Tor2Mine miners dig deep into networks with PowerShell, VBScript" shows how the miner evades detection, spreads automatically in a target network and is increasingly difficult to remove from an infected system. Tor2Mine is a Monero miner that has been active for at least two years. Monero miner Tor2Mine spreads automatically In the investigation, Sophos describes ...

Read more

Microsoft Exchange: Attackers scan for ProxyShell
G Data News

Attackers are currently targeting a number of vulnerabilities known as “ProxyShell”. The vulnerabilities have been closed since April and May. G Data recommends that companies affected patch their Exchange servers immediately. Around the BlackHat security conference, which takes place annually in Las Vegas, security researchers often publish previously unknown security gaps - this year too: three vulnerabilities in Microsoft Exchange are once again causing work in companies that operate an Exchange server locally. The names are: CVE-2021-34473 CVE-2021-34523 CVE-2021-31207 “The attacks by the Hafnium group on local Exchange servers in March of this year ...

Read more