
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Cloudflare and Microsoft expand zero-trust integrations
Cloudflare and Microsoft announced four new integrations that help joint customers deploy, automate and impro...

AuthID integrates Human Factor Authentication with Okta cloud
AuthID announced the integration of its Verified CloudConnect solution with Okta’s Workforce Identity Cloud...

Royal Mail hit by LockBit ransomware attack
The cyberattack impacted the UK postal system's ability to send mail internationally. The UK government ha...

Trend Micro spins off subsidiary for private 5G security, CTOne
Trend Micro announced the formation of CTOne. The new subsidiary will focus on securing private 5G networks. ...

Cisco warns of critical remote access vulnerabilities in SMB routers
Cisco alerted that several routers in its Small Business series contain vulnerabilities that could provide re...

Twitter refutes reports of massive data breach
The social media giant claims the alleged data leak of 200 million users was not stolen by exploiting its sys...

German regulator warns of ‘Godfather’ malware attacks
Germany's finance regulator reports that more than 400 banking and cryptocurrency applications worldwide have...

Auth0 fixes RCE vulnerability in popular JsonWebToken library
The fix mitigates a remote code execution (RCE) vulnerability in a library that's used for 22,000 projects. ...

Kingsing malware exploits Kubernetes environments
Threat actors are using vulnerabilities in the PostgreSQL containers. The Microsoft Defender for Cloud sec...

Researchers find malicious info-stealing packages in PyPI
Security firm Phylum discovered six malicious packages on the Python Package Index (PyPI). The packages insta...