Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Zero knowledge in password managers is not foolproof
For years, password managers have been promoting themselves as secure vaults that even the provider cannot ac...
Palo Alto Networks acquires Koi to monitor agentic endpoints
Following rumors, Palo Alto Networks' planned acquisition of Koi appears to be a reality. At least, the two p...
Infostealer steals identity of AI agent OpenClaw
Security researchers have discovered a live infection in which an infostealer has stolen the configuration fi...
Google patches first Chrome zero-day of 2026
Google has released emergency updates for a critical Chrome vulnerability that is being actively exploited in...
Data breach at Odido: responsibility and compensation under discussion
The recent data breach at internet provider Odido, in which data from an estimated 6.2 million customers was ...
Major hack of Dutch telco Odido was a classic case of social engineering
Customer support got found out multiple times
Proofpoint acquires AI security company Acuvity
Proofpoint has announced the acquisition of Acuvity, which provides tooling for AI security and governance. T...
Check Point acquires security startups Cyclops, Cyata, and Rotate
Check Point has acquired three young cybersecurity companies to further expand its portfolio. The acquisition...
Okta tackles shadow AI with new agent discovery tools
Okta is rolling out Agent Discovery in its Identity Security Posture Management (ISPM) platform to combat the...
Lumma Stealer back despite previous police action
Lumma Stealer is active again and spreading widely through attacks that are difficult to detect. Security res...