
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

New toolkit targets mail and web hosting services
SentinelLabs, the research team from security provider SentinelOne, reports that a new toolkit dubbed AlienFo...

Capita suffers cyberattack, impacting Microsoft Office 365 access
Capita, a leading provider of outsourcing services based in London, announced on March 31 that it had experie...

New cybercrime tactic: selling someone else’s Internet connection
Cybercriminals can hijack and resell the Internet access of unsuspecting users. By making users' bandwidth av...

WordPress plugin Elementor Pro vulnerable to attacks
The widely used WordPress plugin Elementor Pro can be abused to take over websites. According to a NinTech...

Western Digital reports a cybersecurity incident
In a recent announcement, Western Digital revealed that it has fallen victim to a cyber-attack that has cause...

Microsoft Bing penetrated through misconfiguration in Azure Active Directory
Researchers from security specialist Wiz Research penetrated the backend of Microsoft Bing through a misconfi...

CrowdStrike invests in security startup Abnormal Security
CrowdStrike recently invested an undisclosed amount in security startup Abnormal Security through its investm...

Cisco to acquire Lightspin to deliver “Contextual Cloud Security”
The US tech giant will round out its product offering with a "holistic solution" that provides end-to-end clo...

802.11 WiFi protocol has a fundamental design flaw in security
The well-known IEE 802.11 WiFi protocol has a fundamental design flaw in its security, according to researche...

IBM Aspera Faspex servers are being targeted by ransomware gangs
A vulnerability in IBM Aspera Faspex servers is being actively exploited by ransomware criminals, researchers...