News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware targets billion-dollar companies
Ransomware targets billion-dollar companies

Nefilim ransomware specifically targets victims with over $ 1 billion in annual sales. Trend Micro study analyzes one of the most successful threat groups for modern ransomware. Trend Micro, one of the world's leading providers of cybersecurity solutions, has published a case study on the ransomware group Nefilim, which provides an in-depth look at how modern ransomware attacks work. The study provides valuable background on how ransomware groups develop, act underground and how advanced detection and response platforms contribute to their defense. Procedure of modern ransomware families The procedure of modern ransomware families makes it difficult to identify and combat cyber attacks (detection and response) for already overloaded ...

Read more

Lots of false positives when using the cloud
Lots of false positives when using the cloud

False alarms: Cloud-native architectures overwhelm conventional security solutions. Study: Only 3 percent of companies have real-time visibility into runtime vulnerabilities. Traditional approaches to application security are overwhelmed by the increasing use of cloud-native architectures, DevOps and agile methods. That is one of the results of the independent global survey on behalf of the software intelligence provider Dynatrace. The study was carried out among 700 people responsible for information and data security in the company (CISO). Too many false positives Companies are shifting more and more responsibility onto developers in order to accelerate innovation. But complex IT systems and outdated security tools slow the process down by ...

Read more

5G: Security challenge for smart factory environments
5G: Security challenge for smart factory environments

Study: 5G poses a security challenge for smart factory environments. Trend Micro Research highlights various proof-of-concept attacks on connected systems in the study “Attacks From 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Network ”. Trend Micro, one of the world's leading providers of cybersecurity solutions, has released a detailed study revealing emerging threats to 4G/5G campus networks. Many of these take advantage of the difficulties organizations face when patching critical OT environments. Attack scenarios on 5G networks The study describes several attack scenarios and possible protective measures. The test environment mimics the conditions of a smart factory campus network. "The…

Read more

No incidents thanks to security: company saves 1,7 million US dollars
Kaspersky_news

Industrial company saves $ 1,7 million with Kaspersky Industrial CyberSecurity for Networks. Thanks to the solution, the company has had no more security incidents to complain about since implementation. Kaspersky was able to help one of its customers save $ 1,7 million with the Kaspersky Industrial CyberSecurity for Networks solution, according to a Total Economic Impact (TEI) study commissioned by Forrester Consulting. This corresponds to a return on investment (ROI) of 135 percent. After speaking to the customer, a utility company with 400 substations, Forrester calculated the savings based on the ...

Read more

Study: SOC employees complain about overload

Study: More than half of SOC employees complain that work has had a negative impact on their personal lives. New Trend Micro study reveals how understaffed security operations centers and alert overload can impact employee mental health. Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes the results of a new study. This shows that SOC and cybersecurity teams suffer from a high level of stress beyond their day-to-day work. In particular, the overload of alerts is a major trigger for this. The report “Security Operations on the Backfoot: How poor tooling…

Read more

Companies rely on IAM and PAM in the cloud

Identity security in the cloud: 89 percent of companies rely on IAM and PAM in the cloud. ThycoticCentrify Study: Protecting Digital Identities from Risks from Increasing Identity Sprawl. Companies are increasingly relying on cloud-based identity and access management (IAM): 89 percent have implemented best-of-breed solutions for IAM and / or privileged access management (PAM) in cloud environments, which are increasingly hybrid or multi-cloud . This is the result of a new study by ThycoticCentrify, a leading provider of cloud identity security solutions, which emerged from the merger of the leading providers of Privileged Access Management (PAM) Thycotic and Centrify. 150 IT decision-makers were asked for the study ...

Read more

Barracuda study: WebApp security problem 
Barracuda study: WebApp security problem

New study by Barracuda shows WebApp as one of the biggest security challenges in companies. Malicious bots, broken APIs and supply chain attacks are putting enterprise application security under pressure. The study “The state of application security in 2021” shows that companies need to do a lot more to ensure their web application security. What is the situation in companies in terms of application security? Over the past 12 months, how often have organizations been attacked for application vulnerabilities? And what new threats are increasingly challenging those responsible for IT security? The current survey provides answers to these and other questions...

Read more

Most frequent attacks: Denial of service and password login
F5 news

Most common attacks: Denial of Service (DoS) and password login. According to the new F5 study, financial services and many European companies are particularly hard hit. Denial-of-service (DoS) and password login attacks such as brute force and credential stuffing attacks are on the rise. This is shown by a new study by F5 Labs1. The analysis is based on incidents over the past three years that have been reported to the F5 Security Incident Response Team (SIRT). As a result, attacks on APIs (Application Programming Interface) are also increasing. DoS attacks are ubiquitous According to F5 Labs, almost one in three (32%) incidents reported annually was a DoS attack. The percentage increases slightly ...

Read more

Working from home increases cybersecurity awareness among young people
Working from home increases cybersecurity awareness among young people

Kaspersky survey shows: Increased cybersecurity awareness among young people in Germany through working from home. 36 percent fear IT security problems when working remotely, 35 percent already use AI technology or automated digital processes at work and 48 percent hope that AI will support them. As a result of the corona pandemic, more people than ever before are working from home and are dependent on the functionality of a digital infrastructure. But how do Generation Z and millennials in Germany experience the current situation in the home office? And how do you rate the integration of future technologies such as artificial intelligence in the workplace? The most important statement ...

Read more

Ransomware: Horrifying costs, complex, hardly any data return
Ransomware: Horrifying costs, complex, hardly any data return

The Sophos report "The State-of-Ransomware 2021" shows what happens in companies when ransomware attacks occur: Horrific costs, too complex and hardly any data is returned. Ransomware restoration costs an average of around 970.000 euros in Germany - far more than twice as much as in 2020. Sophos announces the results of its global study "The State of Ransomware 2021". Particularly striking: the international average costs for recovery after a ransomware attack have more than doubled in one year, specifically from around 630.000 euros in 2020 (Germany 390.000 euros) to 1,53 million euros in 2021 (Germany 970.000 euros)….

Read more