Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Check Point Infinity AI Copilot helps with security
Users of Check Point solutions will soon be able to receive assistance from the Infinity AI Copilot. This sho...
Number of vulnerabilities in WordPress plugins doubled
The number of vulnerabilities in plugins and themes for WordPress has increased significantly over the past y...
Hackers deploy login credentials they stole at Okta to hack Cloudflare – update
Cloudflare delved deeper into the Okta data breach that occurred in November 2023. The company became one of ...
Attackers in the cloud get too many opportunities to strike
Runtime scans detect policy failures in 91 percent of all cases. As a result, organizations are picking up po...
FBI proactively removes Chinese botnet malware on hundreds of SOHO routers
The FBI hindered the operations of the Chinese hacker gang Volt Typhoon yesterday. The U.S. security agency r...
Dynatrace launches AI Observability
Dynatrace platform extension provides observability for Large Language Models (LLMs) and generative AI-powere...
Runecast acquisition boosts Dynatrace’s security and analytics capabilities
Dynatrace has recently acquired Runecast Solutions. In this way, Dynatrace aims to expand the existing securi...
CyberArk releases online ransomware decryptor
CyberArk recently released an online version of its open-source White Phoenix ransomware decryptor. With it, ...
Phishing campaign spreads malware via Microsoft Teams
The new attack comes via an access request in a Microsoft Teams group chat to spread suspicious files for the...
SentinelOne expands threat hunting in WatchTower and WatchTower Pro
New enhancements should give security teams more insight into the threat landscape. Not only that, they shoul...