News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

NIS2 requirements: What exactly do they mean?
NIS2 requirements: What do they mean in concrete terms? Image: MS-KI

NIS2 requires companies to undertake a comprehensive overhaul of their cybersecurity practices and forces them to assess and improve their supply chain protection measures. The directive affects more than 160.000 companies operating in the EU. Here's a closer look at the new requirements. The NIS2 directive builds on the foundation of its predecessor from 2016 and is a response to the increasing number of supply chain attacks and the need for more robust reporting procedures across Europe. This directive affects more than 160.000 companies operating in the EU, particularly those operating in 15 key sectors…

Read more

End devices: Malware continues to increase massively in 2024
End devices: Malware continues to increase massively in 2024 Image: MS - KI

A recent Internet Security Report from WatchGuard focuses on malware that attacks end devices, such as the widespread "Pandoraspear" malware that targets smart TVs in companies and seeks access. In its new Internet Security Report, WatchGuard Technologies has identified a sharp increase in malware detections for end devices. While the number of malware attacks targeting networks fell by almost half compared to the previous quarter, attacks with malware for end devices rose by 82 percent. Chromium-based browsers in particular increasingly became the source of the malware threat at the beginning of the year. TV hacks: Attackers are looking for new ways...

Read more

Companies are targets of cloud malware attacks
Companies are targets of cloud malware attacks Image: MS - KI

A recent report shows that European companies receive more malware from the cloud than other markets – despite using fewer cloud applications on average. Multi-stage malware families like Guloader are most prevalent in Europe as threat actors seek to exploit popular cloud services. Microsoft's popularity draws attackers' attention: Europe shows a strong preference for Microsoft apps. Here, Microsoft OneDrive (52%), SharePoint (33%), Teams (24%) and Outlook (20%) are the four most frequently used cloud apps on a daily basis. Attackers have recognized this popularity, so OneDrive and…

Read more

Cyber ​​insurance: Managers see companies as poorly protected
B2B Cyber ​​Security ShortNews

Cybersecurity and cyber insurance coverage are more important than ever. Munich Re's third Global Cyber ​​Risk and Insurance Study 2024 provides information about the cyber threat to companies and their growing need for transparent insurance solutions to effectively minimize risks. The survey, which involved more than 7.500 people from 15 countries and various industries, highlights managers' increasing concerns about cybersecurity. Despite increased risk awareness, 87% of respondents in this group doubt that their company is adequately prepared against the digital threat, a notable increase compared to previous years...

Read more

How attackers slip through vulnerabilities in web applications
How attackers slip through vulnerabilities in web applications - Image by Mohamed Hassan on Pixabay

Access control vulnerabilities and data disclosure risks are the most common security flaws in corporate-developed web applications. This is shown by a current analysis in the period 2021 to 2023. This makes it too easy for attackers to break into companies. For its report, security specialist Kaspersky examined vulnerabilities in self-developed web applications from companies in the IT, government, insurance, telecommunications, cryptocurrencies, e-commerce and healthcare sectors. Self-developed web applications defective The majority (70 percent) of the vulnerabilities found concern the areas of data protection with regard to confidential information such as passwords, credit card details, health records, personal data and confidential…

Read more

For businesses: Browsers with identity-based protection
For businesses: Browsers with identity-based protection MS - AI

Now it's available: The CyberArk Secure Browser for companies. It is the first browser to offer greater security and privacy with identity-based protection, combining both with a familiar, productive user experience. The CyberArk Secure Browser relies on intelligent permission controls and can be easily deployed on a variety of devices. It was developed specifically for a cloud-first world and enables secure access to on-premises resources and SaaS applications. The browser provides security teams with unparalleled visibility, control and governance, helping to prevent the misuse of compromised identities, devices and credentials...

Read more

Phishing: This is how employees avoid cyber criminals’ traps
Phishing: This is how employees avoid cybercriminals' traps - Image by Gerd Altmann on Pixabay

In phishing attacks, even one wrong mouse click can cause millions in damage. Here are four tips to help employees make the right decision if the worst comes to the worst OntinueHow companies can raise awareness among their workforce and improve security architecture. With increasingly intelligent applications, cybercriminals are trying to undermine companies' security systems and infiltrate internal IT. While phishing attempts were comparatively easy to detect just a few years ago, social engineering today simulates seemingly genuine requests from colleagues or customers - often using stolen or fake identities, which make detection increasingly difficult...

Read more

German companies: 4th place among global ransomware victims
German companies: 4th place among global ransomware victims - AI - Copilot

Check Point's Threat Intelligence Research Division (CPR) has released its 2024 Annual Cyber ​​Security Report. This year's edition focuses on the dramatic increase in ransomware attacks and the strategic use of AI in IT security. The report looks back on a year marked by significant turmoil and highlights a 90 percent increase in publicly blackmailed victims of ransomware attacks. Such ransomware attacks now account for 10 percent of all malware detected by Check Point's sensors. The Check Point Incident Response Team (CPIRT) also found that almost the…

Read more

The right strategy after a data loss
The right strategy after a data loss KI-MS

Companies around the world face numerous threats. International studies also show this. A study by Arcserve shows that 76 percent of companies have suffered a serious data loss. In this context, 83 percent described downtime of 12 hours or less as acceptable. 10 tips for a successful business continuity plan. As an Arcserve study shows, only 52 percent of affected companies were able to recover from their data loss in 12 hours or less. Although 95 percent of companies said they had a disaster recovery plan, only a small…

Read more

January 28, 2024: European Data Protection Day
January 28, 2024: European Data Protection Day - KI MS

January 28, 2024 is European Data Protection Day. In this context, it is important to raise awareness of privacy and data protection and to raise awareness of relevant IT security issues - regardless of whether they concern the private or corporate environment. Advances in artificial intelligence (AI) and machine learning (ML) are an obvious theme on Data Protection Day 2024 - both because of the potential benefits that such tools bring with them and because of the dangers that come with them, which are certainly cause for concern care for. According to Carla Roncato, Vice President of Identity, WatchGuard Technologies. AI…

Read more