
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Fake Windows 10 updates spread Magniber ransomware
Magniber ransomware is being spread through Windows 10 updates found on fraudulent websites. The scheme was u...

Datadog ASM recognizes SQL injections, cross-site scripting and SSRFs
Datadog launches Application Security Monitoring. The solution blocks attacks on vulnerabilities in APIs and ...

Cloudflare blocks gigantic HTTPS DDoS attack
Cloudflare detected a DDoS attack of 15.3 million HTTPS requests-per-second (rps) -- one of the largest HTTPS...

CrowdStrike extends Falcon for public cloud environments
CrowdStrike added functionality to Falcon CWP and Falcon Horizon. The features focus on securing public cloud...

The European wind energy industry is facing a slew of cyberattacks
Since the start of the crisis in Ukraine, cyberattacks on three European wind-energy businesses have prompted...

‘Number of ransomware attacks rises by nearly 80 percent’
Ransomware attacks are on the rise. In a new survey by Sophos, two out of three organizations say they were h...

Bug bounty platform Intigriti raises 21 million euros
Intigriti's bug bounty platform is catching on. The Dutch company raised 21 million euros in its most recent ...

‘Zero-day exploits will continue to be popular in 2022’
Zero-day exploits remain the most attractive attack vector for cybercriminals. This is made evident by yearly...

Lapsus$ steals source code from T-Mobile
Criminal group Lapsus$ successfully attacked T-Mobile in March of this year. According to research by sec...

Sophos integrates SOC.OS into XDR and MTR solutions
Sophos announces the acquisition of SOC.OS. The company develops a solution that reads and filters alerts fro...