Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Let’s Encrypt drastically shortens certificate lifespans
90 days become 45
French Ministry of the Interior hacked, unclear if any data was stolen
The French Ministry of the Interior announced on Friday that it had been the victim of a cyberattack. Email s...
Why did so many security vendors abandon MITRE’s stresstest?
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
Three new vulnerabilities discovered in React Server Components
Following the critical vulnerability CVE-2025-55182 in React Server Components, researchers have found three ...
Microsoft improves its bug bounty program with “In Scope by Default”
A positive step for Microsoft's security level
Sophos CEO sees “cybersecurity poverty line”: what to do about it?
We sit down with Sophos CEO Joe Levy during Pax8 Beyond to discuss, among other things, the progress of the S...
Docker Hub contains treasure trove of 10,000+ images with exposed secrets
Security research firm Flare discovered over 10,000 Docker Hub images containing exposed secrets during a sin...
OpenAI warns of cyber risks posed by new AI models
OpenAI announced Wednesday that it is establishing a new advisory board, the Frontier Risk Council, as part o...
Microsoft gives guidance on Shai-Hulud 2.0 supply chain attack
The return of the Shai-Hulud supply chain attack was dubbed 'The Second Coming' shortly after the first warni...
Microsoft ends year with patch for exploited zero day
During December Patch Tuesday, Microsoft fixed an actively exploited zero day, along with 56 other vulnerabil...