News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

New tactics used by cyber criminals
B2B Cyber ​​Security ShortNews

Based on analysis of actual attacks, the Cloud Native Threat Report provides IT security professionals with insight into the changing tactics, techniques and procedures of cybercriminals - so they can better protect their cloud environments. The "Cloud Native Threat Report" summarizes the investigations of Aqua's research team Nautilus from the past year. The report covers three key areas: the software supply chain, the current risk situation including vulnerabilities and misconfigurations, and runtime protection. One of the key takeaways: Criminals are investing heavily in resources to avoid detection, as well as being stronger in compromised systems…

Read more

Cyber ​​risks in the software supply chain
Cyber ​​risks in the software supply chain

Log4Shell or Solarwinds are typical examples of attacks on companies through their software supply chain. It is characteristic that cybercriminals do not gain direct access to the target company, but attack via a back door. A comment from Trend Micro. If you look back at some recent attacks (esp. Solarwinds or Log4Shell), you will notice that they are playing more and more "over gangs". This means that the attackers no longer attack target companies directly, but via their (software) supply chain. Whether victims are attacked via compromised Solarwinds updates or vulnerabilities in Log4Shell - in both...

Read more

Protection against supply chain attacks in SMEs 
Protection against supply chain attacks in SMEs

Attacks on the supply chain - the supply chain - for software (and for hardware) from IT also threaten small and medium-sized companies. Updates for services and software represent an increasingly dangerous vulnerability, especially since cybercriminals hope that hijacking an update will spread the attacks to numerous victims. In addition to upgrading their cyber defenses, small and medium-sized businesses should also review their supply chains for sourcing software, hardware, and updates. Unfortunately, attacks on the supply chain are often effective An attack on the IT supply chain aims to disrupt the production process…

Read more