
Pro-Russian hacker group claims attack on Dutch government websites
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Cloudflare detected a DDoS attack of 15.3 million HTTPS requests-per-second (rps) -- one of the largest HTTPS...
CrowdStrike added functionality to Falcon CWP and Falcon Horizon. The features focus on securing public cloud...
Since the start of the crisis in Ukraine, cyberattacks on three European wind-energy businesses have prompted...
Ransomware attacks are on the rise. In a new survey by Sophos, two out of three organizations say they were h...
Intigriti's bug bounty platform is catching on. The Dutch company raised 21 million euros in its most recent ...
Zero-day exploits remain the most attractive attack vector for cybercriminals. This is made evident by yearly...
Criminal group Lapsus$ successfully attacked T-Mobile in March of this year. According to research by sec...
Sophos announces the acquisition of SOC.OS. The company develops a solution that reads and filters alerts fro...
REvil appears to be making a comeback. Security experts discovered a dark web leak page that shows similariti...
Thijs Alkemade and Daan Keuper discovered important vulnerabilities in three widely used industrial ICS syste...