
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Zscaler helps businesses better secure digital assets
Zscaler recently introduced its new service, Zscaler Asset Exposure Management. It allows users to monitor be...

Orange confirms data breach: company documents on the street
Orange has confirmed that its Romanian branch has been hit by a cyber attack in which thousands of internal d...

PayPal addresses abused to send phishing emails
Hackers manipulate the email settings of the PayPal payment platform and send phishing emails from a legitima...

Google Cloud makes digital signatures quantum-safe in KMS
Google Cloud is introducing quantum-safe digital signatures in its Cloud Key Management Service (Cloud KMS). ...

Internal chat logs of Black Basta ransomware gang leaked
The internal log data of the Black Basta ransomware gang between September 2023 and September 2024 was recent...

Microsoft increases bug bounty rewards for Copilot security vulnerabilities
Microsoft is expanding its Copilot bug bounty program and increasing rewards even for vulnerabilities of mode...

OpenText launches threat detection for Microsoft security tools
OpenText is introducing Core Threat Detection and Response, a new AI-driven cybersecurity solution that integ...

Apiiro tools detect malicious code before they cause damage
Application security company Apiiro is releasing two open-source tools to help organizations defend against m...

Palo Alto confirms exploitation of critical vulnerability
Palo Alto Networks reports that hackers are actively exploiting a recently patched firewall vulnerability kno...

OpenSSH vulnerability enables MitM attacks
Security researchers at Qualys have discovered two vulnerabilities in OpenSSH. The more dangerous of the two ...