News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

SMEs in sight: cyber attacks on supply chains

Partnerships, services, customer relationships – no organization operates independently. Contracts, compliances and laws regulate cooperation, but what about security criteria? Cyber ​​attacks on supply chains particularly affect small and medium-sized companies, according to the latest threat report from Sophos. In the latest Sophos Threat Report: Cybercrime on Main Street, the security experts report that in 2023 the Sophos MDR team responded increasingly to cases in which companies were attacked via the so-called supply chain, i.e. the supply chain in business and in the IT infrastructure became. In several cases, the vulnerabilities lay in the remote monitoring and management software...

Read more

Cybercrime: The end goal is always clear – money!
Cybercrime: The end goal is always clear: money!

Cybercrime is a money-making business. It is subject to trends, picks up on current developments and is constantly changing. So the insight and outlook is always just a snapshot or a trend, such as the adoption of vulnerable signed drivers and tactics of state groups. The reuse of existing attack techniques and the emergence of new attacks are common in the threat landscape. Cyber ​​criminals often continue to use successful tools and techniques and will continue to do so until they no longer work. Says John Shier, Field CTO Commercial at Sophos. Cyber ​​criminals are extremely…

Read more

Report: Security and Compliance through Zero Trust
Report: Security and Compliance through Zero Trust

Modern businesses face a number of challenges. How can the Zero Trust approach lead to increased security and compliance? A new report from 451 Research SP Global Business makes the case for simplified management and zero trust applications. The economy is under increased pressure, supply chains are being delayed and the global geopolitical environment is characterized by uncertainty. To make matters worse, the digital landscape is a cyber security nightmare – exacerbated by increasing cyber threats, the new model of working from any location, and the shortage of cyber security experts. The…

Read more

Study: Supply chains already compromised by ransomware
Study: Supply chains already compromised by ransomware

43 percent of German supply chains already compromised by ransomware: New study by Trend Micro shows negative consequences for the visibility of cyber risks as a result of an enlarged attack surface. Trend Micro, one of the world's leading providers of cybersecurity solutions, releases a new study showing that organizations are increasingly vulnerable to ransomware because of their extensive supply chains. For example, 43 percent of the German companies surveyed had already been affected by a ransomware attack in the supply chain (compared to 52 percent worldwide). Targeted by partner companies The study revealed that three quarters of all German IT managers (worldwide…

Read more

Good outlook for cybersecurity professionals

What can we expect in 2022? Are we past the worst or are we just at the beginning of a worrying development? Cyber ​​security professionals are in demand like never before. Michael Scheffler, Country Manager DACH of the data security specialist Varonis Systems, dares four predictions. And again, a turbulent year lies behind us, which intensified many of the previous year's trends: We saw supply chain attacks on IT service providers with far-reaching consequences. Ransomware attacks also seemed to know no boundaries, be it with regard to the quantity and quality of the victims or the sums required, which reached new highs….

Read more

Log4j alarm: this is what Trend Micro recommends
Log4j Log4shell

As an immediate reaction to log4j, companies can follow detailed recommendations and apply existing patches and apply best practices. But in a second step you should take a general look at processes related to software supply chains. Ultimately, Log4Shell, however security-relevant the gap may be, is “only” a faulty component in the software supply chain, ”says Udo Schneider, IoT Security Evangelist Europe at Trend Micro. Log4Shell - Do you know your software supply chain? The critical threat posed by the Log4Shell vulnerability naturally requires an immediate response. But in the second step, companies generally have to ask themselves questions about ...

Read more