Myra’s monthly security highlights present IT decision-makers and security specialists with the most relevant topics from the world of cybersecurity. Hacker trends, defense strategies and reports on cyber attacks, hacker campaigns, and more are available here in a clearly laid out format.
Cloud computing allows almost every digital business process to be outsourced in a cost-effective and high-performance manner. This creates agility and helps to overcome personnel and structural bottlenecks in the company.
But the digital services business has also arrived on the Darknet, where it is very popular with cybercriminals. DDoS attacks, malware, spam and even entire attack campaigns can be ordered in a few clicks, and aimed at any target – technical expertise is no longer required. On the other side, companies are confronted with increasingly ambitious attacks that result in high losses.
The top IT security topics in June
IT security trends
Major raid against users of Darknet platform:
More than 1,400 police officers throughout Germany were involved in a major raid against users of Crimenetwork, the illegal online platform. In over 200 searches, more than 300 TByte of data material was seized, allegedly providing evidence of drug and arms trafficking, botnets, credit card abuse, and other crimes.
Computervirus shuts down Berlin Court of Appeal for nine months:
The majority of the roughly 150 judges of the Berlin Court of Appeal have been unable to work for about nine months because their recently purchased laptops cannot be securely connected to the court’s internal network due to a lack of VPN (via Fefe).
Things to know
IT Security Act: Big update coming up:
The IT Security Act is getting a major update in order to bring the catalogue of requirements and also the BSI itself into line with the current level of threat. In essence, the current draft law for IT Security Act 2.0 provides for an active protective role of the BSI for the government, economy, and public.
SOC: Where all threads of cybersecurity come together:
In the Security Operation Center (SOC), IT specialists continuously analyze and evaluate all security-related data of corporate IT. The SOC’s primary task is to proactively identify and close possible vulnerabilities in systems and to actively initiate countermeasures in case of cyber attacks.