
Cisco wants to use AI to defend AI at machine scale
Cisco made a swath of announcements at RSAC 2025 Conference. Unsurprisingly, several of them had something to...
Cisco made a swath of announcements at RSAC 2025 Conference. Unsurprisingly, several of them had something to...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Ransomware group Conti leaked customer data of eight Dutch housing associations. The associations were attack...
SentinelOne Singularity XDR achieved the highest analytics score in the MITRE Engenuity ATT&CK Evaluation...
An attack on ICT service provider The Sourcing Company led to data leaks at nine Dutch housing corporations. ...
Qualys developed Multi-Vector EDR 2.0 to surface serious and critical incidents. Security specialist Qualy...
German police have shut down Hydra Market. 17 million users and 19,000 sellers used the darkweb forum to trad...
A vulnerability in a third party call center opened the company up to a data breach. On Monday, Okta CEO T...
The new version of Cato Networks SASE recognizes the device type with which network users connect. The distin...
Fortinet released FortiOS 7.2. The new OS version offers more security for the entire network environment. ...
Cyber criminals have hacked email marketing platform Mailchimp. The hackers targeted user data to carry...
Research from Splunk's SURGe division shows that there are major differences between ransomware variants in h...