News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Code signing certificates misused
B2B Cyber ​​Security ShortNews

On February 15, Australian antivirus manufacturer Emsisoft announced that a security incident had occurred in which a fake code-signing certificate was used to disguise a targeted attack against an organization. The attacker's goal was to trick the affected organization into allowing an application that the threat actor had installed and intended to use by making its detection appear as false positives. The attack failed, the antivirus software detected and blocked it. The method by which initial access was gained is still unclear, but most likely either a brute force attack on…

Read more

Domain Shadowing - DNS Compromise for Cybercrime
Domain Shadowing - DNS Compromise for Cybercrime

Cyber ​​criminals compromise domain names in order to attack domain owners or users directly, or use them for various nefarious ventures such as phishing, malware distribution, and command-and-control (C2) operations. A special case of DNS hijacking is known as domain shadowing, where attackers secretly create malicious subdomains under compromised domain names. Shadow domains do not affect the normal operation of the compromised domains, making them difficult to detect by victims. The inconspicuousness of this subdomain often enables the perpetrators to exploit the good reputation of the compromised domain for a long time....

Read more

BSI phone number misused for spoofing
B2B Cyber ​​Security ShortNews

The Federal Office for Information Security (BSI) receives reports that an increasing number of calls are being made using the BSI's phone number (spoofing) and a two-digit extension number. For example, the numbers +49 228 9582 44 or 0228 9582 44 are used. This is not a call from the BSI. The callers pretend to be employees of the BSI. The BSI urgently warns against giving the caller personal data or complying with requests! It is of course to be assumed that the calls have a legal abusive background! Consumers who receive such calls should...

Read more