
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Irish privacy watchdog investigates Twitter after massive data breach
Ireland's privacy watchdog is demanding answers from Twitter about a data scraping incident that leaked user ...

EU officially approves NIS2, member states prepare new security laws
The European Council has greenlit NIS2, a new European security directive. The Council's consent ends an appr...

1Password launches ‘sign-in with’ browser extension for faster logins
1Password's new 'sign-in with' browser extension speeds up logins. Users can leverage the credentials of iden...

Cybercriminals abuse OEM certificates to weaponize Android malware
Malicious Android apps have been signed using legitimate certificates from original equipment manufacturers (...

Qualys introduces security features for Oracle Cloud Infrastructure
Qualys launched new security and compliance features for Oracle Cloud Infrastructure (OCI). The organization'...

LastPass confirms second data breach of the year
Password manager LastPass is investigating an internal data breach. An unauthorized attacker recently gained ...

Researchers hack Hyundai app to open and start a car
Researchers used a vulnerability in Hyundai and Genesis software to open a vehicle and start the motor. Th...

Google links Heliconia hacking tools to Spanish firm
Google's Threat Analysis Group (TAG) has found ties between Spanish software firm Variston IT and Heliconia, ...

AWS wants to replace VPNs with Verified Access
AWS introduced Verified Access. The service allows users to set conditions that devices must meet to access a...

Microsoft strengthens default protection in Defender for Endpoint
The new security offering automatically turns on tamper protection and other features. This week Microsoft...