Select Page

Myra’s monthly security highlights present IT decision-makers and security specialists with the most relevant topics from the world of cybersecurity. Hacker trends, defense strategies and reports on cyber attacks, hacker campaigns, and more are available here in a clearly laid out format.

Cloud computing allows almost every digital business process to be outsourced in a cost-effective and high-performance manner. This creates agility and helps to overcome personnel and structural bottlenecks in the company.

But the digital services business has also arrived on the Darknet, where it is very popular with cybercriminals. DDoS attacks, malware, spam and even entire attack campaigns can be ordered in a few clicks, and aimed at any target – technical expertise is no longer required. On the other side, companies are confronted with increasingly ambitious attacks that result in high losses.

The top IT security topics in June

IT security trends

With Cybercrime as a Service, digital attacks become a service:

Anyone who now wants to digitally target companies no longer has to get their fingers dirty. Cyber attacks are offered as a service on the Darknet.

DNS attacks cost companies an average of EUR 920,000:

In Germany, the financial harm caused by DNS-based attacks on companies amounts to an average of EUR 920,000. According to IDC, phishing, and DDoS attacks are among the most common types of attack.

Why captchas alone are not enough:

Captchas protect web applications from malicious access by bots and spammers. However, the plus in security comes at the price of disadvantages in accessibility and usability. The little image and audio puzzles also present an obstacle for some human users.

Incomplete digitization in the insurance industry:

According to a recent YouGov study, insurers score only average on the digital transformation. While data protection and IT security were rated by the majority, there were shortcomings in the user experience.

Social engineering and phishing in perfection:

Cybercriminals forge business e-mails and websites with ever increasing precision. At first glance, the malicious fakes cannot be distinguished from the originals. Awareness and a trained eye are required to reliably spot phishing.

SMEs underestimate the risks:

German small and medium-sized enterprises are increasingly becoming the focus of cybercriminals. Compared to larger companies, however, medium-sized companies are rarely reliably protected against attacks, and there is often a lack of awareness of the problem.

Cybercrime

Major raid against users of Darknet platform:

More than 1,400 police officers throughout Germany were involved in a major raid against users of Crimenetwork, the illegal online platform. In over 200 searches, more than 300 TByte of data material was seized, allegedly providing evidence of drug and arms trafficking, botnets, credit card abuse, and other crimes.

Computervirus shuts down Berlin Court of Appeal for nine months:

The majority of the roughly 150 judges of the Berlin Court of Appeal have been unable to work for about nine months because their recently purchased laptops cannot be securely connected to the court’s internal network due to a lack of VPN (via Fefe).

Financial service providers in BaFin’s sights:

In its journal, the Federal Financial Supervisory Authority (BaFin) regularly draws attention to shady characters on the financial market who have attracted attention through questionable products and illegal practices. The black sheep at a glance:

Things to know

IT Security Act: Big update coming up:

The IT Security Act is getting a major update in order to bring the catalogue of requirements and also the BSI itself into line with the current level of threat. In essence, the current draft law for IT Security Act 2.0 provides for an active protective role of the BSI for the government, economy, and public.

SOC: Where all threads of cybersecurity come together:

In the Security Operation Center (SOC), IT specialists continuously analyze and evaluate all security-related data of corporate IT. The SOC’s primary task is to proactively identify and close possible vulnerabilities in systems and to actively initiate countermeasures in case of cyber attacks.

Share this article