Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Thousands of Docker Hub container images expose sensitive data
Tens of thousands of Docker Hub container images contain sensitive data such as private keys and API secrets ...
Google Play will crack down on malicious apps with DUNS number
Google Play is going to make uploading malicious apps to its app store more difficult starting Aug. 31. Devel...
WordPress security plugin AIOS saved passwords as plain text
The WordPress security plugin All-In-One Security (AIOS) created a security flaw of its own accord. Because o...
GitHub moves to support passwordless authentication with passkeys
Developer platform GitHub now supports passwordless authentication in a public beta form. This allows users t...
AVrecon: the malware with a botnet army of 70K routers
Researchers at Black Lotus Labs have tracked down a malware variant that has been flying under the radar for ...
Chinese email hack only detectable with most expensive Microsoft subscription
Among Microsoft's cloud computing services are detection tools that could have detected the Chinese email hac...
Cisco acquires Identity Threat Detection and Response startup Oort
Cisco is set to acquire Identity Threat Detection and Response (ITDR) startup Oort. Its technology will be ad...
Huge increase in USB malware in first half of 2023
Research team Mandiant has seen that attacks via USB malware have experienced a threefold growth. These attac...
‘Chinese email hack affects Western European governments’
Microsoft revealed this week that Chinese hackers were conducting spying operations on U.S. organizations. Th...
Hackers spread malware in Windows kernel through open-source software
Hackers use open-source software to sneak in Windows malware and bypass Microsoft's driver restrictions. In a...