Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Millions of credentials for Facebook, eBay and Yahoo leaked
Nearly 71 million login credentials for Facebook, Roblox, eBay, and Yahoo have been available online in recen...
Snyk acquires Helios to expand AppRisk service
Snyk recently acquired Israeli startup Helios. With this acquisition, the DevSecOps specialist aims to expand...
When is a critical vulnerability actually dangerous?
Dozens of new vulnerabilities surface every day. These vary widely, with CVE scores ranging from 0 to 10. The...
Androxgh0st botnet steals AWS and Microsoft credentials
CISA and the FBI warn of a campaign aiming to steal cloud credentials. Cybercriminals are attempting to use t...
Critical supply chain attack possible via PyTorch
Using self-hosted runners in PyTorch for GitHub operations leads to several vulnerabilities, security enginee...
More than 178,000 SonicWall firewalls vulnerable to simple DoS attack
More than 178,000 SonicWall firewalls are vulnerable to Denial of Service (DoS) and Remote Code Execution (RC...
Windows 11 gets support for USB4 2.0 standard
Windows 11 gets support for the latest USB4 2.0 standard, which enables (transfer) speeds of up to 80 Gbps. T...
Juniper firewalls and switches hit by RCE vulnerability
A vulnerability in Juniper Networks' Junos OS operating system for its SRX and EX Series firewalls and switch...
Microsoft most spoofed brand for phishing attacks
Hackers who want to carry out a phishing attack and misuse a well-known brand are most likely to use Microsof...
Microsoft patches BitLocker workaround for Windows 10 systems
Microsoft has patched a BitLocker workaround using a PowerShell script. This vulnerability allowed hackers to...