Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Follow-on extortion campaign attacks Akira and Royal victims
Victims of the Akira and Royal ransomware face additional extortion attempts. The methods used in the "follow...
‘Paying ransomware gangs should be prohibited’
A total ban on paying hackers in ransomware attacks is the only solution to this troublesome problem. This is...
Android phones with Qualcomm chip vulnerable to remote attack
Google recently fixed a critical vulnerability that allows hackers to remotely attack Android phones with a Q...
Hacker causes outage for Orange Spain through weak password hygiene
A hacker last week managed to take down the network of Orange España, the country's second-largest mobile op...
Mimecast reduces human risk with acquisition of Elevate Security
Mimecast is acquiring Elevate Security. The acquisition should have a beneficial effect on human-centred cybe...
Verified X accounts being traded on the darkweb
Verified X 'Gold' accounts of the social media platform X are being taken over en masse by hackers. Subsequen...
SonicWall expands SASE portfolio with acquisition of Banyan Security
SonicWall is acquiring SASE specialist Banyan Security. With this, the company aims to further expand its own...
Mandiant’s X account hacked
A hacker gained access to the X account of Google subsidiary Mandiant to use it for a crypto scam. Mandiant h...
11 million servers still vulnerable to Terrapin SSH attack
A global scan shows that about 11 million servers are still vulnerable to the recently discovered Terrapin SS...
ECB to conduct mock cyber attacks at 109 banks
The European Central Bank (ECB) will stress test 109 banks over the next twelve months to see if they are ade...