Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Nova claims to have hacked KPMG, which denies being compromised (update)
Update 8:00 p.m.: KPMG has responded to the claim made by hacker collective Nova as mentioned in the article ...
Microsoft Outlook on iOS freezes due to coding error
Microsoft confirmed a coding error causes Outlook mobile to crash or freeze when launched on iPad devices. Th...
149 million login details leaked via unsecured database
Data from Gmail accounts and Facebook logins
Skeleton Key campaign exploits trusted RMM tools
Attackers are increasingly bypassing traditional malware defenses by exploiting legitimate remote monitoring ...
Keyfactor and IBM accelerate quantum-secure transition
Keyfactor and IBM Consulting are launching a joint solution that helps companies map their cryptographic syst...
Check Point launches AI-driven Exposure Management
Check Point Exposure Management is designed to help organizations defend against attacks from the AI era by t...
Why AI adoption requires a dedicated approach to cyber governance
AI tools are spreading through the enterprise ecosystem at an astonishing pace. According to McKinsey, AI ado...
What are the cyber threats to the Winter Olympics?
Major sporting events are popular targets for cyber attackers. There are therefore plenty of risks for the Wi...
As VoidLink proves, malware is becoming AI-driven
The discovery of VoidLink, the new Linux malware framework that Techzine wrote about earlier, marks an import...
Cloudflare vulnerability made every host accessible
A critical vulnerability in Cloudflare's Web Application Firewall (WAF) gave attackers easy access to otherwi...