News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

10 groups of hackers attack Exchange vulnerabilities
10 groups of hackers attack Exchange vulnerabilities

More than ten groups of hackers attack Microsoft Exchange security holes. ESET has already identified more than 5.000 infected email servers, mainly in Germany. The recently publicized vulnerabilities in Microsoft Exchange are making waves. The researchers at the IT security manufacturer ESET discovered more than ten different APT (Advanced Persistent Threats) groups that are currently increasingly exploiting the vulnerabilities to compromise e-mail servers and gain access to company data. So the threat is not limited to the Chinese hafnium group, as previously suspected. ESET identified around 5.000 corporate and government email servers that were compromised around the world. The…

Read more

ICS Risk & Vulnerability Report: Vulnerabilities in KRITIS
B2B Cyber ​​Security ShortNews

ICS Risk & Vulnerability Report: Once again, more weak points in industrial plants and critical infrastructures (KRITIS) identified. Manufacturing, energy and water supply are the most vulnerable areas of critical infrastructure. Awareness of the security of industrial networks is growing. In the second half of 2020, 71 percent of the vulnerabilities discovered in industrial control systems (ICS) could be remotely exploited. This is the result of the second half-yearly ICS Risk & Vulnerability Report from Claroty, the Industrial Cybersecurity Company. Compared to 2019, a quarter more ICS vulnerabilities were disclosed, compared to the first half of 2020 the ...

Read more

Home office: gold mine for cyber criminals
Cyber ​​criminals home office

“Until we fully adapt to the new normal of working from home, hackers will use the pandemic to their advantage. To do this, they try to manipulate employees in such a way that they carry out safety-critical actions.” Some expert opinions from F-Secure. The pandemic has made working from home a part of everyday life for many. In addition, large parts of the workforce are currently being encouraged to work from home if at all possible. However, the new situation is a challenge for data security in companies and at the same time increases the risk of becoming a victim of phishing. The new way…

Read more

Unsolved CVEs as exploit points of attack
ivanti news

Ivanti assesses Patch Tuesday in October: Fewer resolved vulnerability problems and no further browser update from Microsoft promotes exploit development. Microsoft interrupted the series of 100 CVEs per month on Patch Tuesday in October, as only 87 CVEs were resolved this month. Six of them were announced publicly. Such a publication is like a kind of jumpstart for attackers in terms of research and development of exploits. To be on the safe side, special attention should therefore be paid to these CVEs. Open vulnerabilities invite exploit attackers The big news in October: Microsoft has the ...

Read more

Focus on major security vulnerabilities
Network points, patch, vulnerabilities

Tenable Specialists: "Not all vulnerabilities are a threat - organizations should focus on the major vulnerabilities". The computer networks of organizations are constantly expanding: IT, cloud, IoT and OT form a complex computing landscape that represents the modern attack surface. This attack surface increases with every new device, connection or application. Add to this complexity a myriad of vulnerabilities that are discovered daily, and the challenges often seem insurmountable. However, the solution is relatively simple – security teams need visibility to understand the risks. More focus on acutely endangered vulnerabilities Independent…

Read more

Cyber ​​risks in dynamic environments
Tenable news

Tenable introduces new functions from Lumin: Predict and combat cyber risks in dynamic environments even faster. Tenable. today announced new features for Tenable® Lumin ™. These give companies the opportunity to align their business goals with cybersecurity initiatives. With the recent enhancements to the Cyber ​​Exposure Management platform, IT security teams can now predict which vulnerabilities pose the greatest business risk. In this way, cyber threats can be effectively reduced in modern and distributed environments. The performance of the global economy increasingly depends on the availability and security of the digital infrastructure. Because of this, cyber risks have become an inherent business risk….

Read more

ICS Risk & Vulnerability Report
News B2B Cyber ​​Security

Claroty publishes findings from the ICS Risk & Vulnerability Report. More than 70 percent of industrial control system (ICS) vulnerabilities discovered in the first half of 2020 can be exploited remotely. Claroty's first biannual ICS Risk & Vulnerability Report shows this, underscoring the importance of protecting internet-enabled ICS devices and remote connections. The report includes the Claroty Research Team's assessment of 365 ICS vulnerabilities published by the National Vulnerability Database (NVD) and 139 alerts from the Industrial Control Systems Cyber ​​Emergency Response…

Read more

Microsoft: Security gap in MFA
News B2B Cyber ​​Security

Security researchers have discovered a vulnerability in Microsoft's Zero Outage Multi-Factor Authentication (MFA). Specifically, it is about a faulty implementation of the FIDO2 and WebAuthn support, as Dominik Schürmann and Vincent Breitmos from Cotech want to find out. FIDO2 or WebAuthn is an open standard for secure authentication on websites and online services. Many Internet service providers have already adopted the FIDO standard and thus offer their users more security when logging in. Matching articles on the topic

Read more

Industry 4.0: critical IT interfaces
Industry 4.0 work

Trend Micro research reveals serious weaknesses in critical IT interfaces for Industry 4.0. Protocol gateways represent a security risk for intelligent industrial environments. Trend Micro today publishes research results that reveal a new type of security gap in protocol gateway devices that could expose Industrie 4.0 environments to critical attacks. These devices, also known as protocol converters, enable machines, sensors, actuators and computers within industrial environments to talk to one another and to connected IT systems. Protocol gateways can be exploited by attackers as the weakest link in the chain. “Protocol gateways rarely receive individual attention, but they are of great importance for Industry 4.0 environments. You can from ...

Read more

DriveLock Release 2020 with new functions
drive lock

The new DriveLock 2020.1 release comes with numerous improvements and implements customer requests as updates: vulnerability scanners, self-service portal for users, pre-boot authentication and much more. DriveLock releases the new 2020.1 release with many improvements and enhancements. The innovations include the DriveLock vulnerability scanner, the network capability of the DriveLock pre-boot authentication including direct login to the Active Directory, the self-service portal for users, e.g. for password reset, and the complete management of Microsoft Defender Antivirus in DriveLock. Additional protection functions and automatic configuration options increase IT security and reduce administrative work thanks to automatic behavior learning ...

Read more