News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Germany: 44 percent of all cyber attacks successful
Germany: 44% of all cyber attacks successful - Image by Moondance on Pixabay / CC0

According to a study of German cybersecurity and IT leaders, security teams are so busy defending against cyberattacks that they no longer have resources for preventive cyber defense. Tenable® today highlighted that 44% of cyberattacks suffered by German companies in the past two years were successful. Security teams are therefore forced to focus their working hours and measures on reactive containment of cyberattacks instead of preventing them in advance. Since less than half (48%) of German companies are convinced that they can successfully manage their own risk exposure with the help of their cybersecurity procedures...

Read more

Manage vulnerabilities and attack surfaces
Manage vulnerabilities and attack surfaces

Since the attack surface is constantly growing in all companies, exposure management and weak point and vulnerability management are becoming increasingly important. The launch of ExposureAI adds new generative AI capabilities and services to the Tenable One exposure management platform. At the same time, the company is introducing “Tenable Exposure Graph,” a Snowflake-based data lake that feeds the ExposureAI engine. This unified data platform, encompassing more than a trillion unique exposures, IT assets and security findings (vulnerabilities, misconfigurations and identities) across IT, public cloud and OT environments, is the world's largest repository of contextual exposure data and...

Read more

BND: LNG terminals possible targets of cyber attacks
LNG terminals possible targets of cyber attacks

The BND warns of cyber attacks on German LNG (liquefied natural gas) terminals. The threat to critical infrastructure is greater than ever. The war in cyberspace is becoming internationalized far beyond the actual crisis regions. A few days ago, the President of the BND (Federal Intelligence Service), Bruno Kahl, warned of cyber attacks on the new LNG (liquefied natural gas) terminals in Germany. Since the Russian attack on Ukraine, it has become clear that the war in cyberspace is becoming internationalized and leaving traces beyond the actual crisis region. Among other things, Germany is relying on LNG as an alternative to Russian gas supplies and is rapidly building...

Read more

Cybercrime costs Germany 206 billion euros
B2B Cyber ​​Security ShortNews

Cybercrime such as the theft of IT devices and data as well as digital espionage, industrial espionage and sabotage will cost Germany around 2023 billion euros in 206, as Bitkom announced on Friday. The damage will exceed the 200 billion euro mark for the third year in a row, according to a Bitkom survey of more than 1.000 companies. “The German economy is a highly attractive target for criminals and hostile states. The boundaries between organized crime and state-controlled actors are fluid,” explained Bitkom President Ralf Wintergerst. Prevention as a challenge for security teams “The threat of cyber attacks has never been...

Read more

Vulnerability in Citrix ShareFile
B2B Cyber ​​Security ShortNews

Tenable Research has discovered a current security vulnerability in Citrix - specifically in Citrix ShareFile. If this vulnerability is exploited, an attacker could steal credentials or tokens, execute code in the context of the victim's browser, or perform a variety of other dangerous actions. Despite the potential impact of the vulnerability, Citrix has chosen not to release information about this issue or notify customers after the issue has been patched. Customers are completely dependent on the cloud providers to resolve the reported issues and must blindly trust that…

Read more

More vulnerabilities in MOVEit
B2B Cyber ​​Security ShortNews

The threat obviously goes further: discovery of another vulnerability for unauthorized SQL injection. MOVEit needs to be patched again to prevent cyberattacks. Vulnerabilities are discovered every day, and attackers keep checking to see if they can monetize a new vulnerability. When a new vulnerability is confirmed, we as defenders need to consider two things: how difficult it would be for the attackers to exploit the vulnerability, and how likely it is that it will be exploited. The latter usually depends on the degree of distribution of the affected software: the more widespread it…

Read more

BSI: Critical 9.8 vulnerabilities in Nessus vulnerability scanner
B2B Cyber ​​Security ShortNews

The Federal Office for Information Security (BSI) warns of critical 9.8 vulnerabilities in Nessus, the vulnerability scanner, which can check not only known vulnerabilities but also software patch levels and configurations. According to Tenable, a quick update is recommended. According to Tenable, the makers of the Nessus Network Monitor vulnerability scanner, the platform uses third-party software to provide certain functionality. Now, the company has discovered that several third-party components have many highly dangerous and even critical vulnerabilities. Therefore, the providers have made an updated version available. Fix 174 vulnerabilities with one version The…

Read more

AI-powered identity security
AI-powered identity security

An exposure management company, has announced the launch of several new distinctive Identity Security products that use the power of Artificial Intelligence (AI) and Machine Learning (ML) to provide a unified view of all user identities and entitlement risks. According to a study conducted by Forrester Consulting on behalf of Tenable, half (50 percent) of surveyed IT and security professionals worldwide say they lack an effective way to integrate user rights data into their vulnerability management. This poses a serious problem as Active Directory usually has something like this...

Read more

Well-known vulnerabilities remain unnoticed
B2B Cyber ​​Security ShortNews

Earlier this week, CISA announced that it had added new Linux vulnerabilities to its catalog, warning that they are being actively exploited. Recent additions to the Cybersecurity and Infrastructure Security Agency's (CISA) Catalog of Vulnerabilities Exploited (KEV) include multiple vulnerabilities in the Linux kernel, as well as other vulnerabilities dating back more than 12 years. While the exact details of how these vulnerabilities were exploited, whether recent or historical, are unknown, there is a trend in which cybercriminals have been successfully targeting known vulnerabilities, particularly those with…

Read more

Patchdays: Increasing exposure to CVEs
B2B Cyber ​​Security ShortNews

The April 2023 Patchday release contains fixes for 97 CVEs (Common Vulnerabilities and Exposures) - seven rated critical and 90 rated important. One of the 97 CVEs has already been misused as a zero day in the wild. “CVE-2023-28252 is an elevation of privilege vulnerability in the Windows Common Log File System (CLFS). It has been exploited by criminals and is the second zero-day use of CLFS privileges this year - and the fourth in the last two years. It is also the second CLFS zero-day vulnerability disclosed by researchers from Mandiant and DBAPPSecurity (CVE-2022-37969), although...

Read more