
Pro-Russian hacker group claims attack on Dutch government websites
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Researchers found a malicious backdoor in a WordPress plugin popular among schools. The premium version o...
The free service determines whether an organization is resilient to vulnerabilities and attacks. Tanium de...
After installing Windows Upgrades given on the May 2022 Patch Tuesday on domain controllers, Microsoft has re...
The threats could impact a large number of companies, the agency says. The U.S. Cybersecurity and Infrastr...
The first day of Pwn2Own Vancouver was a success. Participants won a combined $800,000 for hacking widely use...
Thales announced that it had reached an agreement with Sonae Investment Management to buy two European cybers...
VMware urges customers to immediately patch a critical authentication bypass flaw affecting multiple products...
Barracuda's WAAP platform offers increased protection on multiple fronts. This week, Barracuda announced t...
Researchers from security specialist Worldfence discovered millions of attacks on outdated versions of WordPr...
Security researchers from NCC Group discovered a relay attack method for accessing Bluetooth devices. Some ca...