News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Easypark falls victim to a cyber attack and loses data
B2B Cyber ​​Security ShortNews

As the parking service provider Easypark recently announced, the company was the victim of a cyber attack on December 10th. Easypark states that data was lost, but that it was not sensitive. Users must check for themselves whether they are affected by the data loss at Easypark. The company Easypark informs its customers that the company was hit by a cyber attack on December 10th. Easypark informs on its homepage that only insensitive data was stolen in the attack. The unauthorized access is said to have been noticed immediately and further access is reported...

Read more

BSI lists CrowdStrike as a qualified APT response service provider
B2B Cyber ​​Security ShortNews

CrowdStrike, a leading provider of cloud-based protection for endpoints, workloads, identity and data, has been included in the list of qualified APT response service providers by the German Federal Office for Information Security (BSI). The BSI list helps companies, operators of critical infrastructures and government institutions in their search for qualified security service providers to defend against ongoing or past attacks on their IT infrastructures. CrowdStrike's full-service IR offering meets the strict criteria of the BSI law according to § 3 BSIG and is recommended for responding to APT attacks (Advanced Persistent Threats). BSI recognition underscores CrowdStrike’s leadership role…

Read more

Cybersecurity pros against APT
APT hackers for rent

The hacking industry, which is becoming more professional, not only offers malware and tools for rent. Criminal experts also make their work available for money. Their expertise in advanced persistent threats (APT) requires a defense at eye level: Managed Detection and Response (MDR). Cyber ​​crime has become more organized in recent years and is increasingly based on the example of the business world. For almost a decade, Malware-as-a-Service initially offered a quick entry into the world of cybercrime and the most diverse tools have always been on the illegal market: Remote Access Trojans (RAT), ...

Read more