
Checklist "Cybersecurity for SMEs": Valuable tips - Part 1
by Tina Siering
The threat situation does not allow companies and organisations any breathing space. In this first part of our two-part series of articles, we present five of a total of ten essential measures that help to deal with the issue and prepare for various attack scenarios.
Read more … Checklist "Cybersecurity for SMEs": Valuable tips - Part 1
From SolarWinds to the Sandworm OLE vulnerability, some cyberattacks have been particularly memorable over the past decade. In this article, we have remembered 5 of the most significant IT security incidents of the last 10 years.
Read more … The 5 most significant IT security incidents of the last 10 years
As part of the March patch day, Microsoft has closed a total of 80 IT security vulnerabilities in various products, including for two actively exploited zero days in Microsoft Outlook and in Windows SmartScreen. It is essential to update the affected Office and Windows versions now.
Read more … Update required: Microsoft fixes two zero-day exploits with March patch day
The cloud backup software "Veeam Backup & Replication" is affected by a critical vulnerability (CVE-2023-27532) that allows attackers to access backup infrastructure hosts and leak credentials - even if these data are stored in encrypted form. IT security managers should urgently apply the security update provided by the manufacturer.
Read more … Critical vulnerability in Veeam Backup & Replication requires immediate patching
Dangerous emotet botnet resumes email activity
by Tina Siering
Successful compromises by the notorious Emotet malware are occurring again. After several months of inactivity, the botnet resumed its email activity on 07.03.2023. Some IT security experts called the malware the most dangerous malware in the world. In fact, the damage caused in the past was enormous. Now the malware repeatedly exploits weaknesses in Microsoft Office - the current spread is via emails with malicious Microsoft Word and Excel attachments. If these documents are opened and macros are activated, the Emotet DLL is successfully downloaded into the working memory. You can find out all the background information known so far about Emotet's new activity in this blog post.
Warning about two new malware variants: SwiftSlicer and HeadCrab
by Tina Siering
Two new types of malware are currently causing a stir in the IT security environment: "SwiftSlicer" and "HeadCrab" are new attack variants in circulation that have immense destructive potential and are extremely difficult to detect. In this article, we analyse the current findings of the malware, look at exactly how it works and give tips on how companies and organisations can protect themselves from cyber threats.
Read more … Warning about two new malware variants: SwiftSlicer and HeadCrab
Lateral Movement: How to stop disguised attackers in time
by Tina Siering
Often, an unpatched vulnerability or a phishing email is enough for cybercriminals to gain access to your network. Since the intruders are there to target valuable assets such as sensitive data or critical systems, the attacker first secures his permanent network access. Often undetected, he moves away from the original entry point and penetrates deeper and deeper into the compromised network until the actual target is reached. This method is called "lateral movement" and refers to the lateral movement in a company network - a procedure that can cause great damage. It is therefore all the more important that you are able to identify and stop attackers promptly.
Read more … Lateral Movement: How to stop disguised attackers in time
Cobalt Strike: Attackers are misusing pentesting tool
by Tina Siering
Cobalt Strike is a commercial program developed by the provider Strategic Cyber LLC, which is primarily used by IT companies and security experts. Cobalt Strike can be used to simulate cyber attacks in penetration tests and identify vulnerabilities in networks before they can be exploited by hackers. Despite the manufacturer's existing security precautions, however, cyber criminals also manage to gain access to what is actually a legitimate security tool and misuse it for malicious purposes. In this article, we take a closer look at how Cobalt Strike works, show why cyber criminals are increasingly using the tool and what IT security managers need to do now, to protect their systems.
Read more … Cobalt Strike: Attackers are misusing pentesting tool
ChatGPT: Using artificial intelligence for the next exploit?
by Tina Siering
The artificial intelligence (AI)-powered chatbot ChatGPT from OpenAI can compose texts, conduct dialogues and write programme code. The bot thus has enormous potential to make our lives easier in the future. But hackers can also exploit ChatGPT for their criminal purposes by using the AI to create phishing emails, scams or malware. Malicious code programming no longer even requires programming skills. Although the malware generated so far seems to be relatively simple and only used for testing purposes, this could change quickly. Darknet forums are already discussing how access restrictions for ChatGPT can be circumvented.
Read more … ChatGPT: Using artificial intelligence for the next exploit?
Patch Tuesday 02/2023 - Microsoft releases patches for three actively exploited Windows zero-day vulnerabilities
by Tina Siering
Patch Tuesday for February 2023 is just around the corner. Microsoft releases patches for 75 CVE vulnerabilities, including three actively exploited zero-day vulnerabilities (CVE-2023-21715, CVE-2023-23376, CVE-2023-21823) that should be patched urgently to prevent system privilege malware in the worst case scenario.