The perpetrators are currently targeting victims in the UK, Italy, and Spain. Based on their modus operandi, security researchers are now categorizing the scammers as an Advanced Persistent Threat.

The perpetrators are currently targeting victims in the UK, Italy, and Spain. Based on their modus operandi, security researchers are now categorizing the scammers as an Advanced Persistent Threat.
Der IT-Dienstleister Kontron und der Wiener Certitude Consulting bündeln ihr IT-Security Know-how.
Train, measure and improve team responsiveness to threats through ultra-realistic simulations.
MaliBot is targeted at financial fraud. However, the malware needs access to the Android user interface to do so. Via overlay, MaliBot then also bypasses a login in several steps.
The target is a subsidiary of Darmstadt-based energy supplier Entega. The hackers bring the company's website and e-mail system to a standstill. The Mainz municipal utility is also affected.
Phishing campaign specifically uses employee fears and insecurities to launch attacks.
Cybercriminals are buying credentials on password marketplaces on the dark web, warns Sandra Rios, Head of LastPass Business.
Trend Micro finds that in the last twelve months, 9 out of 10 power, oil and gas, and manufacturing companies suffered attacks that have affected production and energy supply.
CRITIS were targeted by cybercriminals in 2021, according to the BKA's federal situation report "Cybercrime". A guest article by Falk Herrmann, CEO of Rohde & Schwarz Cybersecurity.
Verizon Data Breach Investigations Report 2022: Year-over-year increase in ransomware attacks greater than in the last five years combined.
For many employees, being able to work at home on a computer is an advantage. However, remote working does not make IT security any easier.
Sie heißt LARA und ist eine Security-KI, die sich auf individuelle Anforderungen zuschneiden lässt. Ein Interview mit den Entwicklern aus Österreich.
Recommendation issued jointly by the U.S., Canada, New Zealand, Netherlands and the U.K. provides guidance on mitigating vulnerabilities.
Spam campaign detections starring Emotet increased by 27% during the first quarter.
Number of threats detected from malicious Emotet spam campaigns rises 27 per cent.
Companies such as Amazon, Ericsson, Google, Intel, Microsoft and VMware support their plan with an initial investment of more than $30 million.
RedLine Stealer detected, new malware that seeks to get its hands on confidential data.
Nearly 80% have purchased tools that have failed them and three-quarters believe they could have been unknowingly breached.
Cybercriminals are capable of revealing any password of fewer than 8 characters in just half a minute. How can we avoid it?
BlackCat executable ransomware is highly customizable and supports a number of encryption methods.
Komplettlösung mit Managed Detection and Response-Funktionen zur Abwehr raffinierter Bedrohungen in hybriden Unternehmensumgebungen.
IT-Expert*innen verteidigen virtualisierte Systeme und simulierte kritische Infrastrukturen.
New Lapsus$ cyber attack manages to get hold of T-Mobile's source code.
56% admit that their company cannot stop a supply chain-related attack.
After training thousands of employees, the company makes its knowledge available to other users through the Coursera platform.
The acquired company uses gamification techniques to train users in the prevention of phishing attacks.
Aufrüsten bei Cybersicherheit notwendig, um Wirtschaftsstandort Österreich gegen Angriffe von außen abzusichern.
Although the number of distributed denial-of-service attacks decreased by 3 % in 2021, their complexity has increased.
With this initiative, Fujitsu desires to contribute to boosting digitalization and reducing the mismatch between men and women, thus promoting the employability of women in the field of technology.
The cybercriminals submit fake emergency requests. Allegedly, this is how they get hold of users' addresses and phone numbers. It is possible that the 16-year-old, allegedly behind the recent attacks by the group LAPSUS$, is also invol ...