Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Resecurity lures attackers into honeypot after hack claim
Cybersecurity company Resecurity denies that it has been the victim of a hack by criminals presenting themsel...
Palo Alto Networks reportedly wants to buy Koi for $400 million
Palo Alto Networks is reportedly looking to acquire Israeli cybersecurity startup Koi for approximately $400 ...
Axonius denies rumors it’s negotiating a $2B takeover by Cisco
Cisco is reportedly in advanced talks to acquire Israeli cybersecurity company Axonius for approximately $2 b...
Hackers disrupt French postal and banking services twice
La Poste and La Banque Postale were once again difficult to access on New Year's Day due to a cyberattack. Th...
IBM warns of critical flaw in API Connect
IBM is urging customers to immediately patch a critical vulnerability in API Connect. The flaw allows attacke...
Security experts themselves carried out ransomware attacks
Millions earned through BlackCat/ALPHV
On the heels of 2.0, Shai Hulud 3.0 emerges as a supply chain threat
Security company Aikido Security has discovered a third variant of the JavaScript malware Shai Hulud. This ra...
MongoBleed threatens databases, but detection tool is available
Update December 30: Research by The Shadowserver Foundation shows that 74,854 MongoDB servers are still vulne...
Attackers exploit five-year-old Fortinet vulnerability
Fortinet warns of active attacks on a five-year-old vulnerability in FortiOS. The vulnerability makes it poss...
Malicious Chrome extensions disguise themselves as proxy services
Two Chrome extensions called "Phantom Shuttle" pretend to be proxy services, but in reality steal user data. ...