Schiffl IT: Identifying anomalies in network traffic and systems in real time.
attack
AI Massively Increases the Volume of Cyberattacks
Cybersecurity expert Oded Vanunu from Check Point warns about the number of attacks rather than the quality of cyberattacks by AI.
What to Do Against Cyber Attacks on Hospitals?
Guest author Frank Becker shows what alternatives are available to protect hospitals against cyber attacks.
Ransomware: To Pay or Not to Pay?
Should companies negotiate with ransomware attackers and pay the ransom demanded?
More Complex Vulnerabilities due to Generative AI
Large language models (LLM) are finding their way into more and more IT products. From Kaspersky's perspective, this means that the size of the attack surface is increasing significantly.
Cyber Attacks Hide in Encrypted Data Traffic
Zscaler ThreatLabz Report: Encrypted malware and malicious content are one of the biggest threats, accounting for 78 percent of observed attacks.
Laziness is the Strategy of Cyber Criminals
Cybercriminals are greedy for profit, looking for the least resistance, says Chester Wisniewski of Sophos.
Cyber Marketplaces for Attackers
Attackers are teasing would-be cyber criminals by deploying fake malware kits on code-sharing platforms like GitHub.
Ransomware Protection: Focus on Context and Users
Christoph Buschbeck from VMware explains how companies protect their networks and data in a multi-cloud world.
Ransomware Attack on Cloud Nordic
Customer data of the Danish cloud service provider is irretrievably lost. A commentary by Patrick Englisch of Veritas Technologies.
I am phishing
Why "working from the beach" poses a threat to businesses, explains Zscaler's Tony Fergusson.
SOC: Good Buy, Beats Bad Build
Building an internal security operations centre is neither easy nor cheap. However, an external SOC also brings challenges, says Jochen Koehler of Ontinue.
Automated Data Recovery After Ransomware Attacks
Cisco XDR can automatically detect, backup and restore business-critical data.
IBM: Data Leaks Cost Companies an Average of 4.3 Million Euros
Those who rely more on AI and automation shorten the life cycles of leaks by 81 days and reduce the follow-up costs per incident by 1.76 million euros.
SOC Teams in Permanent Fear
Vectra study shows: Almost all SOC analysts fear missing relevant security events.
Does AI Distinguish Between Good and Bad?
Marco Eggerling from Check Point says that AI should be taught a kind of ethics catalogue right from the start so that it adheres to certain rules on its own.
Expert Survey: The Future of Ransomware
As the ransomware threat intensifies, ransomware protection must react. What do storage and security experts recommend?
Two-Factor Authentication: Rumors of its End are Hasty
Countering 2FA circumvention attempts requires strengthening it with additional measures, says guest author Sébastien Viou of Stormshield.
Ransomware-as-a-Service Floods the Market
Cybercrime is fast becoming a professional services-based industry, according to the WithSecure report.
Interview: CISOs And The Human Factor
The role and responsibilities of CISOs are changing, but is the direction right? We asked Tyler Baker of Bitdefender.
Phishing Trends: It’s No Longer About Malware
The modalities and targets of cyberattackers has changed, warns guest author Lance Spitzner of the SANS Institute.
Money Gone, Data Too
Study: 86 % of German IT and cybersecurity managers have problems with their backup and recovery solutions.
Silicon Valley Bank: Are New Social Engineering Campaigns Looming?
What does the collapse of Silicon Valley Bank mean for cybersecurity? A commentary by Arctic Wolf's Ian McShane.
A New Era in IT Security
eco IT Security Survey 2023: IT experts see an intensification of the cyber threat situation due to the war in Ukraine.
Staff Training Needs in Cyber Security
Employee Security Index (ESI) Benchmark shows it takes an average of three months of training for employees to develop an adequate understanding of cybersecurity.
Ransomware Threatens Companies
Not only companies complain about ransomware attacks, cyber insurers fear further cost increases.
Chinese Hacker Groups Are Active In Europe
APT Activity Report T3 2022 from ESET shows: Groups allied with China have shifted their activities to European countries.
Microsoft Monitors 100 Active Ransomware Groups
They attack their victims with more than 50 ransomware families. The cybercriminals often gain access to networks via phishing. Ransomware-as-a-service contributes to the success of the cyber extortion business model.
An Interview With Chat GPT On AI And Cybersecurity
Chat GPT advises, "Contingency plans should be prepared and employees should be trained to properly respond to an attack."
Brand Phishing Report: Yahoo Is The Most Frequently Imitated Brand
Brand misuse for phishing attacks: Yahoo tops the list, ahead of DHL, Microsoft and Google.