News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

1 million euros in prize money for 58 zero-day vulnerabilities
Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities.

Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities. The Zero Day Initiative announces the results of the current Pwn2Own competition. At the hacking competition initiated by Trend Micro, which will take place from June 24th to 27th. The event took place in Toronto, Canada on October 58, and participants discovered a total of XNUMX previously unknown zero-day vulnerabilities. Gaps in mobile and IoT consumer products were the focus of the hacking event, Ethical hackers find zero-day vulnerabilities Several teams scored at the annual competition held in Toronto...

Read more

IoT devices: threat from the dark web
Kaspersky_news

IoT devices are a popular target for cybercriminals. On the Darknet, these attacks are offered as a service. In particular, services for DDoS attacks carried out via IoT botnets are currently very popular. Services for attacks on IoT devices are increasingly being offered on the dark web. Kaspersky security experts identified over 2023 advertisements for DDoS attack services in various darknet forums in the first half of 700. DDoS attack services for $63,50 In particular, services for DDoS attacks carried out via IoT botnets are obviously very popular with cybercriminals. The costs for these services vary – depending on the existing DDoS protection,…

Read more

Cyber ​​Threats: New Tactics and Trends
Cyber ​​Threats: New Tactics and Trends

Remote access to company networks is increasing and with it cyber threats are increasing. Cybercriminals are constantly developing their attack tactics. As companies' internal cybersecurity becomes more protected and monitored, cybercriminals have evolved their tactics and are focusing on new methods of compromise that provide a larger attack surface than ever before. This means organizations must look beyond their traditional IT boundaries to understand the full scope of threats that could lead to a cyber incident. External threats To better understand this expanded attack landscape, continuous...

Read more

Automated detection of zero-day vulnerabilities
Automated detection of zero-day vulnerabilities

The European IoT/OT security specialist ONEKEY enables the software-supported, automated analysis of unknown zero-day vulnerabilities in industrial products and controls for the first time. This category represents one of the greatest risks for everything that uses software: "Zero-day attacks use security gaps that may have existed undetected for a long time and were not recognized by the manufacturer of the devices and systems. Therefore there is no patch for the vulnerability and global attacks on affected devices can be devastating," says Jan Wendenburg, CEO of ONEKEY. Flourishing trade in vulnerabilities These vulnerabilities are even traded among hackers, a zero-day vulnerability in iOS,…

Read more

New zero-day vulnerabilities are attacked after 15 minutes 
New zero-day vulnerabilities are attacked after 15 minutes

Administrators only have a short window of 15 minutes to 10 hours after the notification of new zero-day vulnerabilities to provide their systems with security updates, a study shows. Attackers are getting faster and faster when it comes to exploiting new zero-day vulnerabilities. This is shown by a study by Palo Alto Networks, for which around 600 security incidents were analyzed. On average, it takes only 15 minutes after a new zero-day security vulnerability is reported for criminals to actively search the Internet for vulnerable systems. So have some of the hardest zero-day vulnerabilities of the past year, including…

Read more

2021: Record year for zero-day vulnerabilities 

The trade in zero-day vulnerabilities and associated exploits is growing rapidly. Mandiant examined the many exploits and summarized the results in a report. China, Russia and North Korea in particular are the major providers of exploits. Zero-day exploits have become so popular among hackers that they have a market of their own. The exploit industry is financially very profitable for criminals, which is why it is constantly growing. Microsoft, Google's Chrome browser - even the big ones are not protected from criminals finding and exploiting security gaps in their systems that were previously unknown...

Read more

Log4j alarm: this is what Trend Micro recommends
Log4j Log4shell

As an immediate reaction to log4j, companies can follow detailed recommendations and apply existing patches and apply best practices. But in a second step you should take a general look at processes related to software supply chains. Ultimately, Log4Shell, however security-relevant the gap may be, is “only” a faulty component in the software supply chain, ”says Udo Schneider, IoT Security Evangelist Europe at Trend Micro. Log4Shell - Do you know your software supply chain? The critical threat posed by the Log4Shell vulnerability naturally requires an immediate response. But in the second step, companies generally have to ask themselves questions about ...

Read more

APT forecasts 2021: changed attack strategies
APT forecast 2021

APT forecasts 2021: Kaspersky experts expect changed attack strategies and new vulnerabilities. In the focus of APT actors: 5G, network applications and multi-level attacks. The Kaspersky experts present their predictions in the area of ​​Advanced Persistent Threats (APT) for the year 2021. Due to the increased attack surface, structural and strategic changes will occur with regard to targeted attacks. APT actors will probably target network applications, increasingly look for 5G vulnerabilities and carry out multi-stage attacks. However, there is also a bright spot: there will be actions against cybercriminal activities, such as the sale of zero days. The annual forecasts were made on ...

Read more