News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

PDFs: The Trojan Horses of Hackers
PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 percent of all malicious attacks occur via email, with PDF attacks now accounting for 22 percent of all malicious email attachments. With over 400 billion PDF files opened last year, the popular file format is the ideal vehicle for cybercriminals. Hackers have now understood how IT security solutions scan and analyze files and are deploying sophisticated countermeasures to evade detection. Check Point Research (CPR) has recently observed huge volumes of fraudulent campaigns launched by traditional security vendors…

Read more

Email attacks have skyrocketed
B2B Cyber ​​Security ShortNews

Companies around the world are facing increasingly dangerous cyber threats. Attacks increased by 21 percent last year. Email attacks, in particular, have increased significantly, by 197 percent, according to the results of a recent cyberthreats report. The Acronis Cyberthreats Report for the second half of 2024 sheds light on the global cybersecurity threat landscape. The situation is tense: The average number of attacks per company has increased by 21 percent. Particularly striking is the rise in email-based attacks, which have increased by 197 percent worldwide compared to the previous year. In addition, there were…

Read more

Cybercriminals abuse DeepSeek for fraud
B2B Cyber ​​Security ShortNews

As artificial intelligence advances, so do the methods used by cybercriminals. The recent rise in AI-powered scams involving DeepSeek shows how generative AI is being used specifically for social engineering. Attackers use this technology to launch deceptively real phishing attacks, spread disinformation, and manipulate users into revealing sensitive information. As companies increasingly rely on AI-powered solutions, they must also be aware of the risks and adapt their security strategies accordingly. Criminal use of DeepSeek DeepSeek, an open-source AI model for natural language processing and content generation, is proving to be…

Read more

Phishing: Cybercriminals imitate payment service Zelle
Phishing: Cybercriminals imitate payment service Zelle

Financial service providers are increasingly falling victim to third-party phishing campaigns. The latest victim is the payment service Zelle. Criminals steal personal data by directing their victims to fake payment service websites. The rise of third-party phishing is extremely worrying, as it not only targets traditional targets, but also the users of various financial institutions. The investigation by security researchers at BlueVoyant sheds light on the sophisticated methods used by cybercriminals to steal users' personal information and login details. Background of the phishing campaign Zelle, a widely used digital payment service, is at the center of these fraudulent activities. The attackers…

Read more

Targeted Russian phishing on 800 EU and US organizations
SophosNews

From Russia with love: Sophisticated social engineering campaign targets access data from 800 organizations. Interestingly, the targets are all in the EU or the USA. Sophos experts see Russian connections. Within 51 days, a group of attackers, presumably from Russia, sent more than 2.000 phishing emails to almost 800 companies and organizations in the government, healthcare, energy and critical infrastructure sectors. The targets were in the UK, Australia, France, Germany, Austria, Italy, the USA and the Netherlands. Perfect phishing with a lot of effort The emails were characterized by...

Read more

Email security: protection against social engineering
Email security: protection against social engineering

Social engineering is one of the main techniques cyber attackers use to threaten email security. One in seven clicks on a malicious URL in email occur within 60 seconds of receiving the message. Proofpoint, a leading cybersecurity and compliance company, today introduces two innovations. With these, the company takes email security to a new level and offers the most comprehensive and effective end-to-end email protection. Proofpoint's Core Email Security Packages uniquely combine new detection capabilities before, during and after email delivery. These include: The industry's first and only protection against…

Read more

StrelaStealer campaign attacks companies
B2B Cyber ​​Security ShortNews

The new StrelaStealer campaign poses a serious threat to organizations in the EU and US, despite the low quality of the deception. According to the latest discovery by security analysts, over 100 European and US organizations are affected by a new attack method: The StrelaStealer campaign . This advanced infostealer has evolved its techniques and now aims to steal email credentials from popular email clients. Such credentials are particularly sensitive because access to social media or email accounts provides a solid foundation for further attacks. The frequency of these attacks has recently changed dramatically. Up to…

Read more

Free online AI tool identifies social engineering  
Free AI online tool identifies social engineering - AI MS

Social engineering also threatens many employees in companies. The new Bitdefender chatbot service Scamio uses a powerful AI service to detect and verify online fraud attempts across email, text messages, messaging apps and social media. Bitdefender has introduced Scamio, a free service to detect attempted scams. The service is intended to help users verify fraudulent online offers via email, embedded links, text and instant messaging by working with a chatbot based on artificial intelligence. Detecting Social Engineering with Scamio The extent of online fraud continues to increase every year. A report from the Federal Trade Commission…

Read more

Cyber ​​risk Social engineering challenges companies
Cyber ​​risk Social engineering challenges companies

Social engineering is a major security risk. Cybercriminals steal credentials from individuals via mobile phishing attacks and infiltrate company infrastructure. Using personal mobile devices for work creates a major gap in security visibility. Security teams in companies are currently facing various challenges when it comes to threat monitoring, i.e. monitoring possible threats. Sascha Spangenberg, Global MSSP Solutions Architect at Lookout, explains the recent changes in attacker behavior: In the past, attackers have attempted to gain access to the infrastructure directly through vulnerabilities or using brute force methods. These attacks are…

Read more

QR Codes and Phishing: Quishing Attacks
B2B Cyber ​​Security ShortNews

How cybercriminals abuse QR codes for phishing. The use of technology is constantly evolving to make personal and professional lives more convenient, as evidenced by the quick response code. For example, this two-dimensional barcode allows users to quickly and easily share website URLs and contact information or make payments. However, this technology has also opened up new opportunities for cybercriminals. QR code phishing attacks, also known as quishing, are on the rise and pose a significant threat to users and businesses alike. QR codes for email attacks Hackers are using QR codes in email attacks, to trick recipients into visiting malicious websites…

Read more