
Im Datenverkehr…Augen auf!
Nach bisherigem Stand des Referentenentwurfs zum IT-Sicherheitsgesetz 2.0 sollen Betreiber Kritischer Infrastrukturen zukünftig verpflichtet werden, auch eine Angriffserkennung zu betreiben. Was das konkret bedeuten kann […]

State of the Cloud Report 2021
Multi-Cloud-Strategie, größere Workloads und ein unvermindert hohes Tempo bei der Cloud-Migration setzten IT-Budgets unter Druck Flexera, Anbieter von Lösungen für Software-Lizenzmanagement, hat den State of […]

Deep Fakes – Reale Bedrohung
Deep Fakes sind Medieninhalte, die durch den Einsatz von Künstlicher Intelligenz gezielt völlig automatisiert manipuliert und über soziale Netzwerke verbreitet werden. Was als Spielerei in […]

Chinese hackers targeted SolarWinds customers in parallel with Russian op
New data suggests that Russia wasn’t the only nation state hacking customers. https://arstechnica.com/gadgets/2021/03/chinese-hackers-targeted-solarwinds-customers-in-parallel-with-russian-op/ […]

New Side-Channel Attack Targets the CPU Ring Bus for the First Time
In a paper published today, a team of academics from the University of Illinois at Urbana-Champaign have published details about a new side-channel attack against […]

At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software
At least 30,000 organizations across the United States — including a significant number of small businesses, towns, cities and local governments — have over the […]

Gootloader Hackers Poison Websites Globally in Order to Infect Business Professionals with Ransomware, Intrusion Tools and Bank Trojans, Warns eSentire
eSentire, a global provider of Managed Detection and Response (MDR) cybersecurity solutions, reported today that the hackers behind the malicious downloader, Gootloader, have poisoned websites […]

Hackers share methods to bypass 3D Secure for payment cards
Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions. https://www.bleepingcomputer.com/news/security/hackers-share-methods-to-bypass-3d-secure-for-payment-cards/ […]

Ryuk Ransomware Updated With ‚Worm-Like Capabilities‘
Prolific Ransomware Can ‚Spread Automatically‘ Inside Networks, CERT-FR Warns https://www.bankinfosecurity.co.uk/ryuk-ransomware-updated-worm-like-capabilities-a-16080 […]

Brand(ed) Lures and GuLoader – The New Face of Email-based Attacks
After analyzing millions of emails, Cofense researchers have summarized some key patterns used during the attacks in the past year. According to them, cybercriminals are […]

Hackers Using Tricky SEO Technique to Deliver Malware Payloads
Cyberattackers are now using a novel attack technique in which they are using Google SEO to deploy malware payloads. This technique takes advantage of human […]

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the […]

Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact
Targeted large-scale ransomware campaigns, referred to as big game hunting (BGH), remained the primary eCrime threat to organizations across all sectors in 2020. The relentless […]

NPower cyber attack – customers warned personal details may have been breached
The firm, owned by E.ON – one of the UK’s big six energy suppliers – has not revealed how many people may have been affected […]

CrowdStrike Slams Microsoft Over SolarWinds Hack
CrowdStrike’s chief executive George Kurtz said the hackers were able to exploit Microsoft’s overly complicated and „antiquated“ architecture. “The threat actor took advantage of systemic […]

The Untold History of America’s Zero-Day Market
The lucrative business of dealing in code vulnerabilities is central to espionage and war planning, which is why brokers never spoke about it—until now. https://www.wired.com/story/untold-history-americas-zero-day-market/ […]
