
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Energy companies increase investments in cybersecurity due to increasing risks
Energy companies see cybersecurity as the biggest risk to their business. Two-thirds of energy professionals ...

Mirai variant Murdoc_Botnet targets cameras and routers
A new variant of the infamous Mirai malware has been discovered. Murdoc_Botnet targets AVTech cameras and Hua...

HPE investigates possible data breach by IntelBroker
Hewlett Packard Enterprise (HPE) is investigating claims of an intrusion after IntelBroker claimed to have st...

Prompt Security fends off dangers from AI programmers
AI assistants make mistakes just like humans, and they may require extra care and attention. Prompt Security ...

HarfangLab positions itself as the open and European EDR player
Paris-based HarfangLab wants to differentiate itself from its endpoint security rivals. CSO Anouck Teiller ex...

Star Blizzard hackers abuse WhatsApp against diplomats
Russian state hacker Star Blizzard is conducting a new spear-phishing campaign. The goal is to compromise Wha...

Microsoft fixes problems with crashing Office 365 apps on Windows Server systems
Microsoft has fixed a well-known problem. That caused Microsoft 365 apps and Classic Outlook to crash on Wind...

File sync tool rsync is vulnerable, 660,000 servers exposed
rsync, a veteran file synchronization tool, contains several vulnerabilities. The new 3.4.0 release is alread...

SentinelOne brings Purple AI analyst to Zscaler, Okta and Microsoft
SentinelOne's security analyst can now be used with third-party data. This expansion should accelerate cybers...

ASML-backed university detected hackers instantly, but outage persists
Eindhoven's Technical University (TU/e) is in the midst of recovering from a hack. Although the attack took p...