Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Multiple vulnerabilities found in Anthropic’s Git MCP server
Anthropic created the Model Context Protocol. Security was not necessarily a key focus in order to accelerate...
Sophos Workspace Protection closes the remote work security gap
Sophos is expanding beyond endpoint and network protection with Workspace Protection. It is a browser-centric...
Ingram Micro data breach affects 42,000 individuals
More than six months after a ransomware attack, Ingram Micro has announced how many people have been affected...
New Windows backdoor emerges in ransomware attack
In a recent attack on a Fortune 100 financial-sector company, ransomware groups used a previously unknown Win...
Chainguard expands EmeritOSS with ten new projects
Chainguard is adding 10 open-source projects to its EmeritOSS program. The new projects include tools for obj...
What Aikido teaches us about software and security
What does the rise of a European security unicorn mean for your department?
Researchers hack malware gang via its own weak spot
Security researchers at CyberArk discovered a critical flaw in StealC malware's infrastructure. Using an XSS ...
Trend Micro brings Vision One to AWS Sovereign Cloud
Trend Micro is making its Trend Vision One platform available on the AWS European Sovereign Cloud. This will ...
Microsoft now enforces stricter security within Intune
This week, Microsoft began enforcing stricter security requirements within Intune. Organizations and users wh...
RondoDox botnet exploits HPE OneView vulnerability on a massive scale
Check Point Research has identified a coordinated attack campaign targeting CVE-2025-37164, a critical vulner...