
Dutch restrict Nexperia to keep its chip secrets outside of China
For one year, Nexperia is only allowed to take decisive action when the Dutch government allows it. The Minis...
For one year, Nexperia is only allowed to take decisive action when the Dutch government allows it. The Minis...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Three German hospitals are victims of a ransomware attack. For security reasons, all systems have been shut d...
The biggest data breaches of all time almost all took place between 2018 and 2020. Since then, no leak has ma...
The so-called Chameleon malware is not new, but it has worrying new capabilities. Android users can download ...
Europol announces that credit card data from 443 online stores from 17 countries has been stolen. Seventeen c...
Google is working on the security of the Chrome browser for the desktop. The functionality of the feature is ...
The number of ransomware attacks continues to increase worldwide. This is despite a previous dip in the numbe...
Security Datalake is taking on an increasingly central role in SentinelOne's offerings. XDR and the new Purpl...
Ivanti recently patched as many as fourteen critical security vulnerabilities in its enterprise MDM solution ...
A new phishing method aims to sidestep the two-step verification of Instagram accounts. A misleading email me...
A new type of attack is targeting the Secure Socket Shell (SSH). This network protocol is used for data trans...