
Dutch Department of Justice offline after Citrix vulnerability
The Department of Justice shut down all internet connections on Friday morning after a serious security threa...
The Department of Justice shut down all internet connections on Friday morning after a serious security threa...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Microsoft has identified Midnight Blizzard, a Russian government-affiliated hacker group, as the driving forc...
Google is adding new privacy features to its search engine. This gives users control over their personal info...
A "critical" vulnerability in Azure AD just won't be addressed by Microsoft. The tech giant appears to have k...
Cloud computing is all about the combination of all kinds of separate components. In that regard, Kubernetes ...
The vulnerability in Ivanti software has been exploited since at least April. That is what cyber security ser...
Akamai is coming out with a new solution for API security. The company promises to use the tool to monitor AP...
Israeli security company Mitiga has found a new way to abuse AWS Systems Manager as a Remote Access Trojan (R...
Sysdig has just released its annual Global Cloud Threat Report. Because of the complexity of cloud environmen...
Hackers have found a way to circumvent mailbox security solutions. A higher number of phishing emails end up ...
Last quarter, hackers mainly set their sights on government agencies and the public sector. The number of att...