
Hackers were two years inside F5: traces erased
Chinese state hackers infiltrated the systems of cybersecurity company F5 at the end of 2023 and remained und...
Chinese state hackers infiltrated the systems of cybersecurity company F5 at the end of 2023 and remained und...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Avanan, a cybersecurity company, has shown a rise in the use of Google Docs’ productivity features to sneak...
The US Consumer and Market Authority (Federal Trade Commission) is threatening fines of hundreds of millions ...
Google acquires security startup Siemplify to expand its data breach prevention capabilities. For this purpos...
Virtualizing the workplace in the cloud or a data center received a huge boost through COVID-19. It's safe to...
Initial Access Brokers (IABs) are a growing threat to businesses, according to research by Group-IB. These IA...
The world of cybercrime is gaining a stronger grip on business. Cybercriminals are becoming smarter, using mo...
The attack is one of the most serious in that country's history The Lapsus$ ransomware gang has compromise...
The recently released Log4j update for Microsoft 365 Defender generated a stream of false notifications. Micr...
The ransomware gang appears to have called their victims' bluff and published files in retaliation for non-pa...
Aquatic Panda, a China-based hacking collective, directly exploited the Log4j vulnerability to attack an undi...