News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cybercriminals are learning
B2B Cyber ​​Security ShortNews

Security researchers have released the 2024 Incident Response Report, which paints a worrying picture of increasing cyber threats. The insights are based on data that Unit 42 collects through its daily work: The incident response and threat intelligence teams help companies assess, respond to and recover from cyberattacks. The 2024 Incident Response Report shows that threat actors are becoming more sophisticated: they are more organized, work in specialized teams for different steps of attacks, and use IT, cloud and security tools. They work more and more efficiently because they have processes and playbooks...

Read more

Response time after alarm: 4 days and more!  
Response time after alarm: 4 days and more!

The Cloud Threat Report Volume 7 reveals: After an alert for a security team, attackers have up to 40 days to carry out their attack in 4 percent of cases. Attackers are helped by the 60 percent unpatched high or critical vulnerabilities. The cloud attack surface is as dynamic as the cloud itself. As organizations around the world increasingly share, store, and manage data in the cloud, the attack surface for businesses is expanding exponentially. This expansion often happens in unknown, overlooked, or poorly secured ways. For attackers, every workload in…

Read more

Remote access Trojan PingPull also attacks financial institutions
B2B Cyber ​​Security ShortNews

New insights from Unit 42 Research: A new, hard-to-detect remote access Trojan called PingPull was recently identified as being used by GALLIUM, an APT (Advanced Persistent Threat) group. It targets telecommunications, government and finance. Unit 42 actively monitors the infrastructure of several APT groups. One of these groups, GALLIUM (aka Operation Soft Cell), has made a name for itself by targeting telecom companies in Southeast Asia, Europe and Africa. The geographic focus, industry focus and their technical prowess coupled with the use of well-known Chinese malware, tactics, techniques and procedures…

Read more