
Memory-safe malware: Rust challenges security researchers
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Due to the explosion of AI agents, an extension of the OAuth protocol is needed. Okta wants to respond to the...
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...
A new version of the Android malware Godfather creates isolated virtual environments on mobile devices to ste...
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...
CISA warns US federal agencies about attackers targeting a serious security flaw in the OverlayFS submodule o...
Bitdefender has announced the acquisition of Mesh Security, a company specializing in email security. The cyb...
Security company Trend Micro is introducing a new line of data center appliances that come with pre-installed...
Veeam has released security updates to address multiple vulnerabilities in Veeam Backup & Replication (VB...
AWS was the first cloud provider to make multi-factor authentication (MFA) mandatory for accounts with root a...