
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Hundreds of thousands of mail servers vulnerable due to Exim bug
Hundreds of thousands of servers running the Exim mail transfer agent (MTA) software are highly vulnerable to...

Microsoft leak exposed 60,000 government emails
Chinese government-affiliated hackers Storm-0558 stole 60,000 U.S. government emails in May. They could do th...

Cisco routers vulnerable due to replacing firmware with backdoor version
The U.S. government is warning about the China-affiliated Blacktech hacker gang replacing firmware in edge de...

Hertzbleed: how GPUs can leak data to hackers
American researchers have discovered an unusual way for hackers to steal data. A so-called GPU.zip attack all...

LockBit 3.0 most active ransomware gang in August
LockBit 3.0 carried out the most ransomware attacks in the month of August this year. 125 of the total 390 at...

New Windows 11 22H2 update puts stronger focus on passkeys
The recently released update for Windows 11 22H2 gives users new security features, such as passkeys via Wind...

Ransomware gang Ransomed.vc abuses GDPR to receive ransom money
The ransomware gang Ransomed.vc claims to have carried out a successful ransomware attack on Sony. Remarkably...

Kaspersky: ‘Hackers increasingly active in IoT device market’
The number of attacks on IoT devices continues to increase, say Kaspersky researchers in their latest overvie...

Researchers denounce Apple and Google for improperly classifying zero-days
Recently, both Apple and Google patched zero-day vulnerabilities in their software. What was not clear from t...

Intel improves confidential computing with Intel Trust Authority service
Intel is pushing harder to deliver confidential computing with the introduction of its new Intel Trust Author...