
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Acer confirms 160 GB data leak
Acer has confirmed a 160 GB data leak of documents from repair employees. The data leak became public after c...

CrowdStrike and Dell Technologies team up to secure businesses
CrowdStrike and Dell Technologies will jointly provide solutions that allow businesses to better secure thems...

Business-grade routers hit by Hiatus malware
Business-grade DrayTek routers are under attack by the Hiatus malware campaign. The successfully attacked rou...

Nearly all companies have misconfigurations in cloud environments
Nearly all organizations (98.6 percent) are experiencing worrisome misconfigurations that pose significant ri...

Study attacks EU cloud security label that excludes US vendors
The study was commissioned by a US non-profit industry group dedicated to "open markets". This week Reuter...

Hackers hit British retailer WH Smith
The cyberattack resulted in the theft of some company data. On Thursday, UK retail group WH Smith announce...

Microsoft releases security updates for Intel CPU vulnerabilities
Microsoft has released out-of-band security updates to tackle the 'Memory Mapped I/O Stale Data (MMIO)' infor...

GitHub’s secret scanning alerts service is now generally available
The service is designed to detect leaked secrets across the entire publishing history of a repository, includ...

Fortinet unveils new cybersecurity products and services for OT
The cybersecurity firm is introducing new range of solutions for Operational Technology environments. This...

WIP26 malware attacks telecom operators
The WIP26 malware uses public cloud environments to launch attacks against telecom operators. The malware tri...