
Over 1.000 companies are facing infected WordPress websites whose security is threatened by JavaScript backdoors. The attack method uses four different backdoors for maximum damage. Companies must therefore implement proactive security strategies.
Hacking as a mass business: In the current issue 4/2024, our CEO Tim Schughart The Rhein-Zeitung Wirtschaft provides insights into the “business model” of cybercrime. It provides information on which companies are currently particularly targeted by attackers and how those responsible can reliably protect their companies.
"Hacking is a mass business that you can do from a farm somewhere in the countryside, provided the Internet works," says Tim Schughart. This statement makes it clear that cybercrime is not limited to a mystical underground world, but is a global, organized crime focused on financial gain. It is a precise industry that makes a huge amount of money.
Schughart points out that many companies still believe that they are not important enough to be the target of a cyber attack. "There is still a prevailing opinion that one's own company is far too unimportant to be the target of a cyber attack. That is a misjudgment." This misjudgment makes many small and medium-sized companies easy prey for cyber criminals.
Hacking is a mass business that you can run even from a farm somewhere in the countryside. Provided the Internet works.
Companies often underestimate the threat posed by so-called ransomware attacks. "The victim's IT systems are blocked using so-called ransomware, for example," explains Schughart. The attackers then demand a ransom, often in Bitcoin, to make tracking more difficult. But this is just one of the many threats that companies face. The loss of customer data can not only be expensive, but can also cause significant damage to a company's reputation.
The idea that only highly intelligent nerds work in the background is a myth, according to Schughart. "There is actually only a small group of really good hackers. The rest function like a marketplace. Today, you can buy malware and then use it without much effort." The ease with which malicious software can be acquired and used significantly increases the risk for companies.
To protect companies from these threats, ProSec offers comprehensive security solutions and services, including penetration testing (pentests), security consulting and incident response. "Test, test, test!" emphasizes Schughart. Targeted attacks on networks or IT systems can uncover and fix vulnerabilities. These tests are essential to reducing a company's vulnerability to cyberattacks.
An outstanding example of ProSec's work is the defense against a planned cyber attack on a children's hospital in Bangladesh. "The IT system of a children's hospital in Bangladesh was to be manipulated," reports Schughart. Thanks to the quick reaction and commitment of the ProSec team, the attack was successfully fended off at no cost to the hospital.
In an increasingly digitalized world, the threat of cybercrime is ever-present. Companies must act proactively to protect their IT systems. ProSec is your reliable partner to ensure that your systems are protected against all types of cyberattacks.
Over 1.000 companies are facing infected WordPress websites whose security is threatened by JavaScript backdoors. The attack method uses four different backdoors for maximum damage. Companies must therefore implement proactive security strategies.
Hackers use misconfigurations in AWS for targeted phishing attacks. Companies are thus unknowingly opening their IT infrastructure to attacks. Traditional security measures often fail to defend against this threat.
Security researchers discover a security hole in Apple's "Find My" network that enables industrial espionage. Using the "nRootTag" method, attackers can secretly turn devices into tracking devices. Companies around the world are alarmed and are looking for protective measures.
We use cookies, and Google reCAPTCHA, which loads Google Fonts and communicates with Google servers. By continuing to use our website, you agree to the use of cookies and our privacy policy.