
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Attackers target .NET developers with malicious NuGet packages
Developers are being attacked by threat actors using "sophisticated typosquatting techniques". Threat acto...

Ferrari has disclosed a data breach
The breach compromised some of Ferrari's IT systems, after which the company received a ransom demand from ha...

Only 8 percent of Dutch companies prepared for cyber threats
Only 8 percent of organizations in the Netherlands are prepared for modern cyber security threats, according ...

Emotet malware now distributed by Microsoft OneNote email attachments
The move intends to bypass Microsoft security restrictions and infect more targets. Emotet is a notorious mal...

Zscaler provides Posture Control with DLP and threat intelligence
Zscaler has added new functionality to Posture Control for securing applications. Data loss prevention (DLP) ...

NordPass announces passkeys solution to tackle the password problem
NordPass, part of NordVPN, is announcing the development of its new password storage solution: NordPass Passk...

Orange Cyberdefense and Microsoft collaborate on managed security services
The Managed Workspace Protection and Managed Threat Detection services are designed to help businesses across...

Samsung Exynos chips have 18 zero-day vulnerabilities
The flaws could compromise certain Samsung chips in dozens of Android models, wearables, and vehicles. Projec...

Fraudulent QR codes increasingly threaten mobile devices
Users of mobile devices are increasingly at risk of phishing when they scan fraudulent QR codes. There are al...

Dell Technologies doubles down on security services
Dell Technologies has introduced new security services. The services should help companies better protect the...