
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

How effective are ChatGPT-generated phishing attacks?
While generative AI constantly improves, a Hoxhunt study found that humans are still the better option for de...

Rubrik suffers data leak through Fortra GoAnywhere MFT solution
Attackers didn't get access to customer data. This week data security company Rubrik announced that it had...

Hackers attack security researchers via LinkedIn
North Korean state hackers are behind a new phishing campaign targeting security researchers. This was dis...

ECB to test banks for cyber resilience in wake of increased attacks
Europe's central bank is reacting to a jump in cyber threats since the start of the Ukraine war Following ...

IceFire ransomware now also affects Linux systems
The IceFire ransomware affects not only Windows systems, but now also Linux-based systems. According to se...

Update: Acronis responds to claimed hack
Acronis confirms a 12.2 GB data leak. Earlier, a popular hacker forum announced the data breach. In a stat...

SentinelOne and Wiz team up for better cloud security
SentinelOne and Wiz are going to work together to deliver optimal cloud security. For this, different securit...

Fortinet updates FortiSASE; SASE from a single vendor
Fortinet has announced updates to its single-vendor Secure Access Service Edge (SASE) product FortiSASE. The ...

Microsoft makes major change to Excel due to rising malware attacks
The effort aims to stop attackers from abusing various Office document formats as an infection vector. The co...

Four Steps to Take Your API Security to the Next Level
APIs, or application programming interfaces, are an essential part of modern software development. They enabl...