
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Qualys TotalAppSec addresses API risks
Web apps are a popular attack path for cybercriminals. Qualys wants to help organizations secure applications...

DeepSeek is unsafe, and it’s got nothing to do with China
Those looking for an AI tool to facilitate illegal activities might want to turn to DeepSeek. Experts have sh...

Google Play repelled millions of malicious apps in 2024
In 2024, Google took several measures to improve the security of the Android and Google Play ecosystem. These...

Microsoft removes free VPN feature from MS Defender
Microsoft is going to discontinue the free VPN feature in MS Defender within Microsoft 365 Personal and Famil...

What are the security risks in the age of cloud adoption?
Organizations are rapidly embracing digital transformation, with the public cloud and containers as key strat...

Taking over browsers via ‘syncjacking’: what is it?
Attacks via browser extensions have been possible for a while. New research now reveals a method by which mal...

Tenable buys startup Vulcan Cyber for greater insight into vulnerabilities
Tenable recently acquired Israeli security startup Vulcan Cyber for $150 million (€144 million). The exposu...

Hackers spend 17 to 44 days in corporate networks
Research by Cisco Talos shows that cybercriminals stay undetected in corporate networks for an average of 17 ...

Outdated WordPress versions and plugins abused for large-scale malware attack
Hackers are currently abusing outdated WordPress versions and plugins to trick visitors to thousands of websi...

Chat history DeepSeek exposed due to security blunder
Due to an unsecured database, DeepSeek users' chat history was accessible via the Internet. A malicious party...