News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

These are the most important security vulnerabilities and attack techniques
These are the most important security vulnerabilities and attack techniques

The number of reported security vulnerabilities increased by 2024 percent in 38. As dependence on software systems grows, so does the attack surface. JFrog explains the biggest security risks of 2024 and ways to increase resilience in 2025. The increasing interconnectedness and dependence on software systems has significantly expanded the attack surface for cyber threats. In 2024, the number of reported vulnerabilities reached a new high, with over 40.000 CVEs—an impressive increase of 38 percent. The following analysis, based on the findings of the JFrog Security Research Team, highlights the most significant security vulnerabilities and attack techniques...

Read more

Cybersecurity is gaining priority at the executive level
Cybersecurity is gaining priority at the executive level

A software company's survey of IT and cybersecurity professionals showed that companies are willing to spend more money on cybersecurity. New security tools are a challenge for employees, but they also relieve the burden. AI hype and regulatory pressure determine selection criteria for software solutions for information and cybersecurity. New security incidents are reported every day and several new regulations on IT security are on the horizon: the pressure on companies to give IT security a higher priority is growing. This is reflected in the resources they invest in information and cybersecurity. Last year, only 37 percent of those surveyed did exactly that...

Read more

Identify and patch vulnerabilities
Identify and patch vulnerabilities

The new software version "Vulnerability and Patch Management" supports companies in the automatic detection of vulnerabilities and in the automatic or manual patching of these. Advanced functions and dashboards make administrators' work easier. The IT security manufacturer ESET has presented its new version of ESET Vulnerability and Patch Management. The solution supports organizations even better in reliably detecting and fixing security gaps in their systems. If the software has identified vulnerabilities in operating systems or common applications, administrators can have the required patches installed automatically or intervene manually. ESET Vulnerability and Patch Management has been further expanded and offers...

Read more

NIS2: Outdated software is a risk
NIS2: Outdated software is a risk

NIS2 affects companies that are part of the critical infrastructure. They all have to check whether the software on their devices is up to date and update it if necessary. This applies to all devices, machines and systems in the office, laboratory, production and logistics. "With the entry into force of NIS2, not only the IT networks in the affected companies are subject to the new cybersecurity regulations, but also all industrial controls, office and laboratory equipment, industrial machines and systems that are integrated into the network," says Jan Wendenburg, CEO of the German cybersecurity company ONEKEY. The cybersecurity expert cites typical examples in the office sector...

Read more

A current software bill of materials is the exception
A current software bill of materials is the exception

A software bill of materials (SBOM), i.e. a parts list of all software components in a networked device, is the exception in German industry, although it is considered an indispensable prerequisite for effective protection against cyber attacks. This is the result of the new "OT+IoT Cybersecurity Report 2024" by the Düsseldorf-based cybersecurity company ONEKEY. The study on the cyber resilience of industrial controls (Operational Technology, OT) and devices for the Internet of Things (IoT) is based on a survey of 300 executives from industry. Chief Executive Officers (CEOs), Chief Information Officers…

Read more

Risk of software vulnerabilities: Seven tools for searching
Risk of software vulnerabilities: Seven tools for searching Image: Bing - AI

There are plenty of vulnerabilities in software and there is plenty of software in companies. This causes hackers to try their luck again and again. What tools do IT administrators need to prioritize closing gaps and weaknesses? Here are 7 solutions. Closing new vulnerabilities as quickly as possible is a key task for IT security managers. Professional hackers are quickly informed about gaps and often carry out attacks within 24 hours in order to gain access to the company network via these new gateways. Companies of all sizes and industries are in their sights, because cyber criminals are looking everywhere for...

Read more

AI-powered software development platform
AI-powered software development platform

A provider is introducing Flowsource, a new platform based on generative artificial intelligence (GenAI). It is intended to simplify, improve and accelerate software development - during all phases of the software development life cycle. The platform integrates digital assets and tools that help cross-functional development teams deliver high-quality code faster and with more control and transparency. Every company is currently faced with the challenge of having to transform into a technology company. The market dynamics are correspondingly high. Emerging technologies, new competitors and increasing customer demands require companies to change at a speed that they...

Read more

Dangers of software supply chains
B2B Cyber ​​Security ShortNews

The software landscape continues to grow, and so it is not surprising that the vulnerabilities and attack surfaces of software libraries are not getting smaller. Software supply chain attacks are particularly attractive to threat actors because, if successful, they can gain access to hundreds or thousands of applications with just one attack. Exploiting vulnerabilities or compromising source code in trusted applications can allow an attacker to operate from a central location and move around the network undetected. Various solutions to this danger vector are being researched, a…

Read more

Report: High vulnerability rates in government applications
Report: High vulnerability rates in government applications

The 13th edition of the State of Software Security Report, publishes the trends in the software landscape and how security practices are evolving. Some of the results are worrying: 82 percent of applications developed in the public sector had at least one security vulnerability discovered, compared to 74 percent in private companies. The State of Software Security study shows that applications for the public sector tend to have more security vulnerabilities than applications for the private sector. The higher number of errors and vulnerabilities in applications correlates with an increased security risk. The study was carried out against the background...

Read more

Improved security solution for Mac computers
B2B Cyber ​​Security ShortNews

The IT security manufacturer ESET has presented its latest version of ESET Cyber ​​Security for macOS. The security solution for Mac computers has numerous new and improved functions. In addition to protection against the latest cyber threats, ESET Cyber ​​Security for macOS now also offers native support for ARM. ARM processors have become increasingly popular as chipsets in recent years due to their high performance and low energy consumption. This has resulted in the ARM-based mobile computing market now surpassing the traditional x86-based market in both revenue and unit count…

Read more