Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Linux-based malware uses 30 WordPress exploits to inject JavaScript

Linux-based malware uses 30 WordPress exploits to inject JavaScript

New Linux-based malware uses 30 vulnerabilities in WordPress plugins to inject malicious JavaScript. Antivirus vendor Dr. Web reports that the malware comes in two variants capable of attacking Linux-based WordPress sites by exploiting outdated plugins. The first variant found, Linux.BackDoor.Wo... Read more

date1 year ago
Thousands of Citrix ADC and Gateway endpoints still vulnerable

Thousands of Citrix ADC and Gateway endpoints still vulnerable

Thousands of Citrix ADC and Gateway endpoints are still vulnerable to two known vulnerabilities for which fixes already exist. This was recently discovered by security specialist Fox-IT in an investigation. According to the security specialist, thousands of Citrix ADC and Gateway deployments wor... Read more

date1 year ago
‘Google Ads increasingly used to spread malware’

‘Google Ads increasingly used to spread malware’

Cybercriminals are increasingly using the Google Ads platform to spread malware as legitimate software. This is according to recent research by Guardio Labs, Trend Micro and others. Cybercriminals are increasingly spreading malware masquerading as legitimate software. They create a clone of the ... Read more

date1 year ago
US House of Representatives bans TikTok

US House of Representatives bans TikTok

According to the House's administration arm, the prevalent Chinese video app TikTok has indeed been banned across all US House of Representatives-managed devices, mirroring a regulation that will shortly go into effect prohibiting the service from US government devices. The app is considered "hi... Read more

date1 year ago
Critical Linux kernel zero-day needs patching

Critical Linux kernel zero-day needs patching

We have bad news for all Linux system administrators on vacation or planning to vacation: There is a critical Linux kernel security bug. The Zero Day Initiative (ZDI), a zero-day security research organization, revealed a new Linux kernel security problem. This vulnerability allows authenticated... Read more

date1 year ago
EU presents final text of NIS2 directive

EU presents final text of NIS2 directive

The European Union recently published the final text of the updated Network and Information Security (NIS2) Directive. The directive, which will enter into force in three weeks, requires companies belonging to critical infrastructure to implement certain security measures. The improved NIS direc... Read more

date1 year ago
Okta’s source code has been stolen

Okta’s source code has been stolen

An internal memo indicates that Okta's source code has been stolen by one or more unauthorized users. The organization claims the breach does not affect customers. BleepingComputer obtained the internal memo from an anonymous source. Okta CSO David Bradbury writes that one or more unauthorized ... Read more

date1 year ago
Cyberattack hits industrial giant ThyssenKrupp

Cyberattack hits industrial giant ThyssenKrupp

ThyssenKrupp, a German multinational industrial engineering and steel manufacturing company, is fighting a cyberattack. One or more threat actors are targeting the firm's Materials Services division and corporate headquarters. The nature of the attack was not disclosed. "Thyssenkrupp is cur... Read more

date1 year ago
Researchers use ChatGPT to generate malware and phishing mails

Researchers use ChatGPT to generate malware and phishing mails

Researchers used ChatGPT to write malware scripts and generate phishing emails. The AI model has since been updated to prevent abuse. ChatGPT is in the spotlight. OpenAI, the model's developer, recently made the technology publicly available. ChatGPT generates texts and code based on queries. In... Read more

date1 year ago
1 82 83 84 85 86 276