
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Check Point and Wiz team up for CNAPP consolidation
Big win for Wiz

A new hack corrupts Gemini’s long-term memory
Indirect prompt injection is a fundamental technique to make chatbots perform malicious actions. Developers o...

1Password and Oracle Red Bull Racing join forces
1Password is set to become the exclusive Cybersecurity Partner at Oracle Red Bull Racing. After signing a mul...

Four Sky ECC cybercriminal suspects arrested in Europe
Dutch and Spanish police recently arrested four major distributors of the criminal Sky ECC service. The suspe...

3 in 5 organizations expect cyber attack this year
New research by Zscaler shows that organizations urgently need to improve their cyber resilience. While 94 pe...

Vulnerability in Cityworks leads to Microsoft IIS attacks
Trimble, a software vendor for the construction industry and others, is warning of a critical vulnerability i...

LLM hijackers target DeepSeek API
LLMjacking has been taking off recently, Sysdig notes. For example, accounts for access to DeepSeek's LLMs we...

Secureworks acquisition by Sophos is complete
After the two parties announced their merger in October, Secureworks is now officially part of Sophos. With t...

Microsoft: public ASP.NET keys being misused
Microsoft warns that ASP.NET machine keys found online can be misused for malware attacks. The company provid...

Abandoned Amazon S3 buckets help attackers on their way
Deleted or disused Amazon S3 buckets are proving to be a significant attack vector for cybercriminals. Securi...