
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Cloudflare blocks unencrypted HTTP traffic to API
Cloudflare has recently blocked all non-encrypted HTTP connections to its APIs via api.cloudflare.com by defa...

Vulnerability in Veeam Backup & Replication gives hackers access to backup servers
Veeam warns of a critical Remote Code Execution (RCE) vulnerability that allows cybercriminals to hack backup...

Critical vulnerability in WP Ghost plugin affects over 200,000 websites
A serious vulnerability in the popular WordPress security plugin WP Ghost allows attackers to gain unauthoriz...

ChatGPT popular yet most blocked AI tool in companies
AI gives cybersecurity teams headaches

DollyWay malware has been hunting WordPress sites for eight years
In the space of eight years, the so-called DollyWay malware has managed to infect more than 20,000 WordPress ...

Cloudflare launches platform for real-time information about threaths
Cloudflare is introducing a platform to provide cybersecurity teams with cyber threat intelligence. The infor...

GitHub Actions targeted again in supply chain attack
Tens of thousands of repositories have fallen victim to a supply chain attack via a GitHub Action. Security s...

Overconfidence in cybersecurity increases risks for organizations
86% of employees believe they recognize phishing. However, many employees overestimate themselves when it com...

Windows bug exploited since 2017, but it won’t be fixed
The Trend Zero Day Initiative (ZDI) has found 11 hacker groups with state support from North Korea, Iran, Rus...

WSO2 Identity Server 7.1 tackles IAM challenges
At WSO2Con in Barcelona, the company appears to have plenty of updates around Identity and Access Management ...