News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Attack Surface Threat Report shows unmanaged attack surfaces
Attack Surface Threat Report shows unmanaged attack surfaces

Palo Alto Networks' security research team evaluated more than 100 companies across multiple industries to map their unmanaged attack surfaces. The results have been compiled in the current Attack Surface Threat Report. Seasoned security professionals know that while zero-days make the headlines, the real problems arise from the dozens of small decisions that are made every day in an organization. Even a single accidental misconfiguration can create a weak point in the defense. Targeting Oversights and Misconfigurations Opportunistic attackers are increasingly targeting these oversights and misconfigurations as it…

Read more

Scanners for Cloud Native Security

The Cloud Native Vulnerability and Risk Scanner now offers new capabilities that enable users to seamlessly integrate and scale cloud native security into their software development lifecycle (SDLC). Aqua Security, the leading pure-play cloud native security provider, today announced several updates to Aqua Trivy, making it the world's first unified cloud native security scanner. By consolidating multiple scanning tools into a single tool, Aqua Trivy is now the most comprehensive vulnerability and misconfiguration scanner for cloud native applications and infrastructure. Trivy…

Read more

Hacking competition uncovers 25 zero-day vulnerabilities 
Trend Micro News

Trend Micro's Pwn2Own brings well-known technology manufacturers together and promotes vulnerability research. The hacking competition thus increases security for around 1 billion end users. Participating as partners: Microsoft, Tesla, Zoom and VMware. There was also 1 million in prize money. Trend Micro, one of the world's leading providers of cyber security solutions, is once again positioning itself as a technology innovator with the hacking event Pwn2Own. On the occasion of the 15th anniversary of the event, 25 zero-day vulnerabilities were uncovered at software providers. These include the partners Microsoft, Tesla, Zoom and VMware. Participants were recognized for their efforts with prize money of more than...

Read more

BSI: Combination of vulnerabilities makes VMware products vulnerable
B2B Cyber ​​Security ShortNews

The BSI reports that a combined exploitation of critical vulnerabilities can allow the takeover of selected VMWare products. The issue has a warning status of Yellow. The Common Vulnerability Scoring System (CVSS) rates the vulnerabilities at 7,8 (high) and 9,8 as critical. On May 18.05.2022th, 2022, the company VMWare published the security advisory VMSA-0014-2022 with information on two critical vulnerabilities in various VMWare products. A combined exploit of the CVE-22972-2022 and CVE-22973-XNUMX vulnerabilities could allow attackers to gain administrative access with root privileges without authentication. The following products are affected by these two vulnerabilities: VMware Workspace…

Read more

Cyber ​​Attacks: Industry hardest hit
Cyber ​​Attacks: Industry hardest hit

For the first time in five years, there are more cyberattacks on the manufacturing industry. It has thus overtaken the financial and insurance industry in terms of the number of attacks measured. This is shown by the current X-Force Threat Intelligence Index 2022 from IBM. Most attacks on production involve exploiting vulnerabilities (47%) and phishing (40%). Cyber ​​criminals exploit the important role of manufacturing in global supply chains in order to disrupt them. Also, manufacturers have a low tolerance for downtime. Ransomware takes advantage of the pandemic In addition, ransomware takes advantage of the stress situation aggravated by the pandemic…

Read more

Malwarebytes with Vulnerability Assessment and Patch Management
Malwarebytes with Vulnerability Assessment and Patch Management

New features of Malwarebytes Nebula Cloud Console streamline threat management in a single cloud platform. Malwarebytes simplifies threat management with new modules for vulnerability assessment and patch management. Malwarebytes, a global leader in real-time cyber protection, announces the addition of two new modules to its Nebula cloud-based endpoint protection platform: Vulnerability Assessment and Patch Management, both powered by OPSWAT. Together, these features make Malwarebytes' offering one of the simplest endpoint security platforms to help organizations prevent security breaches. 60 percent of attacks due to vulnerabilities Exploiting software vulnerabilities is one of the most common attack methods: Almost 60 percent of security breaches are…

Read more

IoT and 5G: opportunities and risks for companies 
IoT and 5G: opportunities and risks for companies

Numerous companies are in the midst of digital change, which is also being driven to a large extent by the Internet of Things (IoT). However, IoT devices still have major security weaknesses, leaving organizations exposed to new cyber threats every day. Additionally, new technologies such as 5G have made IoT devices even more vulnerable to zero-day exploits and software tampering. So, with the spread of IoT, what can organizations do to protect against such attacks? A comment by Sunil Ravi, Chief Security Architect Versa Networks. IoT devices are a security risk Telecom giant Ericsson estimates it will…

Read more

Mobile health devices: Kaspersky discovered 33 security vulnerabilities
Mobile health devices: Kaspersky discovered 33 security vulnerabilities

Kaspersky experts last year found 33 vulnerabilities in the most commonly used protocol for transmission of mobile health devices used for remote patient monitoring. Qualcomm Snapdragon also affected. 18 vulnerabilities are critical vulnerabilities. That's 10 more than in 2020, many of them still unresolved. Some of these vulnerabilities allow attackers to intercept data being sent online from the device. Increase in vulnerabilities in 2021 The ongoing pandemic has led to rapid digitization of the healthcare sector. There…

Read more

Ransomware Report 2022: Zero-Day Vulnerabilities
Ransomware Report 2022: Zero-Day Vulnerabilities

Hackers are increasingly targeting zero-day vulnerabilities and the supply chain. 29% more ransomware associated CVEs and 26% more ransomware families compared to last year. These are just some of the findings from the 2022 Ivanti Ransomware Report. Security vendor Ivanti has presented the findings of the Ransomware Spotlight Year End Report, conducted jointly with Cyber ​​Security Works, a CNA (Certify Numbering Authority) and Cyware. The report identifies 32 new ransomware families in 2021, bringing the total to 157, an overall 26% increase year-on-year. The report shows that these ransomware groups…

Read more

Vulnerability Intelligence module enables CVE prioritization
Vulnerability Intelligence module enables CVE prioritization

SearchLight with new Vulnerability Intelligence module. Monitoring solution from threat intelligence provider Digital Shadows enables CVEs to be prioritized for faster triage and mitigation. Cyber ​​threat intelligence provider Digital Shadows has added a new vulnerability analysis capability to its SearchLightTM solution. The Vulnerability Intelligence module enables security teams to identify relevant CVEs (Common Vulnerabilities and Exposures) more quickly and effectively prevent exploits. SOCs: Identify Relevant CVEs Faster The module in SearchLight is based on nine years of intensive research and analysis by Digital Shadows' forensic threat intelligence team. The analysts continuously monitor criminal forums, collect…

Read more