Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Anthropic Claude hacked: LLM becomes malware factory in eight hours
Psychological games with Claude
First large-scale LLMjacking generates tens of thousands of attacks
Between December 2025 and January 2026, security researchers discovered a disturbing evolution in AI-targeted...
Nearly 30 million SoundCloud accounts affected by data breach
A data breach at SoundCloud that came to light in December 2025 is now becoming clearer. The data breach moni...
Zscaler launches AI Security Suite to secure AI applications
Zscaler presents a new AI Security Suite designed to help secure the deployment of generative and agentic AI....
Upwind raises $250 million for cloud security
Upwind has completed a Series B financing round of $250 million, bringing its total capital raised to $430 mi...
Nova claims to have hacked KPMG, which denies being compromised (update)
Update 8:00 p.m.: KPMG has responded to the claim made by hacker collective Nova as mentioned in the article ...
Microsoft Outlook on iOS freezes due to coding error
Microsoft confirmed a coding error causes Outlook mobile to crash or freeze when launched on iPad devices. Th...
149 million login details leaked via unsecured database
Data from Gmail accounts and Facebook logins
Skeleton Key campaign exploits trusted RMM tools
Attackers are increasingly bypassing traditional malware defenses by exploiting legitimate remote monitoring ...
Keyfactor and IBM accelerate quantum-secure transition
Keyfactor and IBM Consulting are launching a joint solution that helps companies map their cryptographic syst...