
IGEL benefits from seismic VMware and Windows 10 shifts
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
No matter how strong IT security is, cyberattacks are almost impossible to prevent. IGEL argues that endpoint...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Fox-IT has detected a major exploitation campaign on Citrix NetScaler servers. In cooperation with the Dutch ...
Hackers are currently attacking LinkedIn accounts en masse worldwide. According to security specialists at Cy...
People have been trying to protect themselves against criminals in numerous ways. In the digital field, honey...
The Background Task Management tool built into macOS to thwart malware turns out not to perform its function ...
The administrator of platform 16shop was arrested last week, Interpol reports. 16shop was a Phishing-as-a-Ser...
The Monti ransomware gang is active again after a short break and is using a new Linux locker for its attacks...
Cybercriminals are increasingly trying to trick victims into installing malicious apps that are supposedly in...
Fortinet is expanding its offerings with two new SD-WAN services. The Underlay Performance Monitoring Service...
Google recently released a hybrid key encapsulation mechanism (KEM). This should protect the sharing of symme...
Microsoft researchers have discovered fifteen vulnerabilities in the CODESYS V3 software development kit. Aft...