
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Linux IoT devices vulnerable to self-spreading botnet
Linux devices connected to the Internet of Things (IoT) are vulnerable to NoaBot. This botnet is linked to cr...

New form of phishing: What is quishing and why is it dangerous?
Phishing is a technique that is still commonly used by hackers even though the attack is years old. Small cha...

150,000 WordPress sites at risk due to vulnerable SMTP plug-in
A popular WordPress plug-in intended to send emails faster has been found to leave 150,000 websites vulnerabl...

Dutch police and Cisco Talos take down Babuk Tortilla ransomware
Cooperation between Cisco Talos and the Dutch police has led to disabling the Babuk ransomware's Tortilla var...

API use increases significantly, but poses greater risks
The use of APIs is increasing all the time, but it also poses greater management and security risks as a resu...

McAfee’s Project Mockingbird tackles audio deepfakes
McAfee wants to fight deepfakes more strictly. With the introduction of Project Mockingbird, the security com...

API security is starting to get the attention it deserves from organizations
Recent research by Noname Security shows that many organizations say they understand that they need to proper...

Critical vulnerability in EPM software Ivanti lets hackers take over core server
Ivanti's Endpoint Management (EPM) software contains a critical vulnerability that allows hackers to hijack e...

637,000 people become the victim of a data breach for the second time
The US law firm Orrick, Herrington & Sutcliffe, which specializes in data breaches, became the victim of ...

Follow-on extortion campaign attacks Akira and Royal victims
Victims of the Akira and Royal ransomware face additional extortion attempts. The methods used in the "follow...