News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Threat potential from state actors
Threat potential from state actors

The extent of the current threat situation is illustrated by a cyber attack that recently occurred in Ukraine. According to Ukraine's State Computer Emergency Response Team (CERT-UA), an unnamed state-owned company was compromised, infecting around 2.000 computers with the DIRTYMOE (PURPLEFOX) malware. It is a modular malware that allows attackers remote access and is primarily used for distributed denial-of-service (DDoS) attacks. The exact impact on Ukrainian operations was not disclosed. Globally, the number of cyberattack attempts increased by more than 2023 in 104…

Read more

Threat from state actors
Threat from state actors

Trend Micro, one of the world's leading providers of cybersecurity solutions, announces the discovery of a security vulnerability in Microsoft Windows Defender. This is actively exploited by the cybercriminal group Water Hydra. Trend discovered this vulnerability on December 31, 2023 and has automatically protected customers from it since January 1, 2024. Organizations are advised to take immediate action to forestall continued exploitation of this vulnerability by cybercriminals. The vulnerability (CVE-2024-21412) is an active zero-day vulnerability that was reported to Microsoft by Trend Micro's Zero Day Initiative (ZDI). Trend Micro gives…

Read more

Threat Report: Decoy Dog Trojan targets businesses
B2B Cyber ​​Security ShortNews

Decoy Dog is anything but an ordinary Trojan. After his discovery in April 2023, he again changed his malware tactics. The hackers took action to continue maintaining access to already compromised devices. The attacker can be safely outmaneuvered via DNS recognition algorithms. The second Infoblox Threat Report on the Decoy Dog Trojan includes extensive updates. Decoy Dog is a Remote Access Trojan (RAT) discovered in April 2023. This malware uses the Domain Name System (DNS) to establish command-and-control (C2) communication and is suspected of…

Read more

State actors and cyber criminals can hardly be distinguished
State actors and cyber criminals can hardly be distinguished

State actors or cyber criminals: the lines are blurring. According to the ESET security experts, the campaigns by state actors have increased. ESET reports on the current situation and gives forecasts for the future. Whether hackers who are supported by governments or financially motivated cyber criminals: It is no longer possible to differentiate between these actors. The boundaries between this and "classic" cyber crime are becoming increasingly blurred. Hacker groups who have drawn attention to themselves through Advanced Persistent Threat (APT) attacks also try to make financial profits from their activities. Conversely, cyber criminals sell their tools on the dark web, for example ...

Read more