
Data breach involving 16 billion credentials is not what it seems
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Both the volume and complexity of cyberattacks increased significantly in the past year. This is concluded in...
CrowdStrike and Cloudflare expand their relationship by integrating a zero-trust platform CrowdStrike and ...
Hacker collective LightBasin used a new Unix rootkit to steal financial data from ATMs in order to carry out ...
Officials say the move is just a precaution and is not based on any security breach. Italy's government is...
Konfir – a UK-based B2B SaaS platform – has raised funding worth £1.6 million to improve its product, en...
Noname Security and HighPoint are partnering up. HighPoint will use Noname Security's API Security Platform t...
The malware uses DNS tunneling for communications A recently discovered botnet under active development ta...
Threat analysts saw 722 different ransomware strikes utilizing 34 different variations in Q4 of 2021, in...
SentinelOne intends to acquire Attivo Networks for 616.5 million dollars (562 million euros). SentinelOne wil...
The method used was first introduced by a French mathematician in the 1600's. Cryptographic keys generated...