Press releases Press Releases

NEW 01.02.2024 Press Releases
Logo Safer Internet Day 2024

Safer Internet Day 2024: educating children about sex bots, fake accounts, pornography and other online dangers

G DATA CyberDefense AG gives security tips on the international day of action
"Together for a better internet" is the motto for Safer Internet Day on February 6, 2024. Sex bots or fake accounts can be behind unwanted messages with sexual content on social media. They spread malware via links or try to lure unwitting users into subscription traps. To mark the day of action, G DATA CyberDefense is giving parents safety tips on how to protect their children online and raise their awareness of the dangers.
NEW 30.11.2023 Press Releases
GDATA-IT_Security_Trends_2024_CMYK

G DATA IT security outlook 2024: More fakes, more regulations and rising ransom demands

Cyber criminals are using artificial intelligence to manipulate texts, images and voices.
What cyber risks will companies be facing in the coming year? According to G DATA CyberDefense, artificial intelligence (AI) is becoming more and more of a serious threat to IT security. This is because cyber criminals are increasingly exploiting the great potential of artificial intelligence and jeopardising IT security with fakes. Other challenges such as increasing regulatory requirements and high ransom demands are making IT security even more of a Sisyphean task.


NEW 31.05.2023 Press Releases
G_DATA__ThreatReport_KeyVisual

New attack methods: cyber criminals are exploiting UEFI vulnerabilities and abusing Microsoft file formats

G DATA threat report shows that the IT security situation remains tense
The number of averted IT attacks is plateauing at a high level. This is reflected in the current threat report from G DATA CyberDefense. Numerous vulnerabilities that cyber criminals are consistently exploiting give cause for concern. For example, UEFI bootkits deactivate security functions and make systems vulnerable to attack. Another of the attackers’ ploys is manipulated OneNote and Publisher files that contain malware.

NEW 09.03.2023 Press Releases
G_DATA_KeyVisual_ThreatReport

Attacks every few seconds: Around 100 malware variants per minute threaten IT security

G DATA threat report: Attackers rely on phishing and malvertising
Security experts at G DATA CyberDefense identified around 50 million different malware programs in 2022. This is twice the number for 2021, according to the new threat report from G DATA CyberDefense. In addition to phishing, attackers are increasingly using malvertising, i.e. malicious advertising, and search engine poisoning to spread malicious code. In addition, the number of averted cyber attacks rose sharply again in the fourth quarter of 2022.

NEW 28.02.2023 Press Releases
G_DATA_MobileSecurity_2022_1_300dpi_Original

G DATA Mobile Security Report: Attacks on smartphones every minute

Cyber criminals infiltrate mobile phones using familiar methods
Smartphone owners with Android devices are exposed to a high level of cyber risk. The number of attacks is decreasing, but the quality of the attacks is clearly improving. Two new malicious apps per minute threatened Android users last year, and there is no end in sight. Stalkerware also remains a major problem – this is spyware that private individuals use to track victims at every turn.
NEW 23.02.2023 Press Releases
ftapi-Logo-standard

FTAPI entrusts data security to G DATA CyberDefense

Munich-based software company expands its Secure Data Workflow platform with a premium AV scanner

Exchanging data digitally via platforms or by email is standard today. In companies or public authorities alike, files - including highly sensitive ones - are sent everywhere. In order to provide data, information and systems with even better protection against cyber threats, FTAPI is now collaborating with G DATA CyberDefense, adding the option of integrating a premium antivirus scanner into its Secure Data Workflow platform. This means that the Munich-based software company not only enables the simple encryption of files and prevents the unintentional outflow of information, but also efficiently protects systems and entire IT infrastructures from malicious code.

Load more