
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

‘Personal data of 1 billion Chinese residents for sale’
An anonymous user of a hacker forum claims to hold the personal data of 1 billion Chinese citizens. Although ...

Azure AD update adds time-limited credentials
Microsoft is allowing Azure Active Directory (Azure AD) administrators to generate time-limited credentials. ...

Google blocks over thirty malicious domains used by hackers
Google blocked over thirty malicious domains connected to cybercriminal groups in Russia, UAE and India. T...

New SessionManager malware attacks Exchange servers
Kaspersky researchers discovered a new malware variant that attacks Microsoft Exchange servers. 'SessionManag...

Google Workspace now alerts key changes to administrator accounts
Alert Center will inform administrators of sensitive and critical changes to configurations of Google Workspa...

Microsoft patches vulnerability in Service Fabric
Microsoft patched a serious vulnerability in Service Fabric. The threat was discovered by security specialist...

Google Cloud Armor adds rate limiting to combat DDoS attacks
In light of recent attacks against cloud-based users, Google added new capabilities to Cloud Armor. In a r...

A new, highly sophisticated malware strain threatens various routers
An "unusually advanced hacking group" has spent almost two years infecting a wide range of routers in North A...

‘Nearly one million Kubernetes clusters vulnerable to attacks’
Research by security specialist Cyble indicates that more than 900,000 Kubernetes clusters are vulnerable to ...

AMD possibly affected by RansomHouse cyberattack
RansomHouse claims to have captured data from AMD. In a statement, the chip manufacturer says it's investigat...