
Dutch Department of Justice offline after Citrix vulnerability
The Department of Justice shut down all internet connections on Friday morning after a serious security threa...
The Department of Justice shut down all internet connections on Friday morning after a serious security threa...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
HubSpot has been hit by a hacking attack. Hackers managed to steal data from about 30 customers. Especially c...
The Lapsus$ group may have hacked Okta. The authentication provider confirms that it is investigating the hac...
The White House has issued a warning to businesses that Russia may be preparing cyberattacks against key infr...
Zscaler expands security platform Zero Trust Exchange (ZTE) with three Zero Trust Network Access solutions. P...
The McAfee Enterprise offshoot offers an SSE portfolio that includes SWG, CASB, ZTNA, and more. Symphony T...
Lapsus$ claims to have access to the developer account of a Microsoft employee. Last month, the ransomware gr...
The hacker group works on behalf of Russia on an ad hoc basis. A cache of 60,000 leaked chat messages and ...
Implementing endpoint security best practices is crucially important in times when a remote working culture h...
A third of all Log4j instances remains unpatched more than four months after the discovery of a highly critic...
Both the volume and complexity of cyberattacks increased significantly in the past year. This is concluded in...