Malware

SaarGummi: Into The Future with Next-Generation Firewalls

Controlware and Palo Alto Networks modernized the firewall and network infrastructure of automotive supplier SaarGummi. Twelve globally distributed locations were equipped with next-generation firewalls and SD-WAN links and merged into a centrally managed network. Luxembourg-based SaarGummi is continuously driving the digitization of its production and business processes – and must also reliably protect its increasingly …

SaarGummi: Into The Future with Next-Generation Firewalls Read More »

Protecting the Cloud From LAPSUS$-like Threats

Protecting the Cloud from lapsus$ like

With high-profile attacks on Microsoft, Okta, and other major tech companies, cybercrime group LAPSUS$ made headlines a few months ago. UK police have since arrested seven suspected members, aged between 16 and 21, but does that mean the threat has been averted? Certainly not: similar attacks can and will follow. Therefore, it is worth taking …

Protecting the Cloud From LAPSUS$-like Threats Read More »

Cyber Threats to Midsize Businesses on The Rise

small business cyber threats

The coronavirus has triggered a “digital pandemic.” Medium-sized businesses, in particular, have become a greater focus for cybercriminals because security measures in many places are inadequate. To protect data, companies cannot rely on pre-pandemic protocols, policies, and infrastructures and must implement appropriate identity and access management solutions. Cyberattacks incur high costs that can bankrupt small …

Cyber Threats to Midsize Businesses on The Rise Read More »

Recognizing the Most Common Threats – Not Guessing

Although most companies today are equipped with more than ten different security solutions, it is still becoming more difficult for them to get an accurate picture of the biggest risks. IT security budgets are steadily increasing, with security breaches – as security systems become denser – increasing significantly in frequency. As early as October 2021, …

Recognizing the Most Common Threats – Not Guessing Read More »

Vulnerability Research for Industrial Cybersecurity

IT security research communities have been around for a long time. They share their findings with each other and with the manufacturers of affected products to promote fixes that protect users. Manufacturers have long seen this contribution as beneficial as well, often offering bug bounty programs through which researchers are financially motivated and rewarded. But …

Vulnerability Research for Industrial Cybersecurity Read More »

The Status Quo in Security Awareness Training

The Status Quo in Security Awareness Training

Security awareness training always helps to protect the company and make the workforce more security-savvy. However, there are different approaches to designing them – some more effective than others. To strengthen cybersecurity, it is essential for organizations to train their own employees in the secure use of IT, networks, emails, and co. In many companies, …

The Status Quo in Security Awareness Training Read More »

Risk Management & Human Factors in Business Cybersecurity

One source of danger that must not be neglected in the development of an IT security strategy: is the human being. But it’s just not the typical “link-clicking” employee that needs to be considered here, but other human flaws and strengths that enable successful attacks.” Ask IT security experts where a company’s biggest vulnerability lies, …

Risk Management & Human Factors in Business Cybersecurity Read More »

94 Percent Increase in Attacks on Health Care

Ransomware attacks on healthcare organizations are noticeably on the rise. However, paying the ransom is no guarantee of getting encrypted data back. Hacking attacks on the healthcare industry pose a real threat. This is now confirmed once again by Sophos’ industry analysis, “The State of Ransomware in Healthcare 2022.” According to the report, there has …

94 Percent Increase in Attacks on Health Care Read More »

Unmistakable Clues to An APT Attack

Unmistakable Clues to An APT Attack-

APT hackers avoid verifiable events, error messages, or service interruptions and target data theft or system monitoring over an extended period of time. After that, they usually disappear again unnoticed. Is it possible to detect something that should remain silent and unnoticed? APT hackers and malware are more widespread and sophisticated than ever. For some …

Unmistakable Clues to An APT Attack Read More »

Cracks in The Ransomware Ecosystem

According to the UK’s National Cyber Security Centre (NCSC), ransomware is the most immediate threat to businesses worldwide. Cybercrime around ransomware is organized and sophisticated, with technology that has been democratized and made accessible to the point that ransomware has become its own economy. Some ransomware operators are playing a numbers game by targeting MSPs …

Cracks in The Ransomware Ecosystem Read More »

What Are Virus Scanners?

What Are Virus Scanners?

An antivirus program protects computers from malicious software. This can be, for example, Trojans, worms or spyware, and other malware. Antivirus software is able to detect, block and remove malicious software. What are virus scanners? Basically, virus scanners, often called malware scanners, can be divided into different types depending on their function. Commonly used is …

What Are Virus Scanners? Read More »