
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Supermicro servers affected by various vulnerabilities
Eclypsium security researchers have found a new set of vulnerabilities in the management control firmware used...

Huawei accuses US government of illegal actions against workers
The Chinese manufacturer Huawei has accused the American government of illegal actions against the company and...

Cybercriminals steal over 200,000 euros with AI voice manipulation
A group of cybercriminals has managed to steal $243,000 (€222,000) by using artificial intelligence (AI)...

Social media apps greatest threat to enterprises
Social media apps bring with them most of the concerns of security professionals when it comes to potential ne...

Siemens launches industrial hosting platform for cyber security
Siemens has released a new version of the Ruggedcom APE (Application Processing Engine). Ruggedcom APE is an i...
Fileless malware attacks up 265 percent
Fileless malware - where the necessary files for an infection are not installed on the system - is becoming in...

Barracuda Networks strengthens bone protection with InfiSecure technology
Barracuda Networks has adopted the collision detection technology from InfiSecure Technologies. With this tech...

Many companies don’t notice cyber attacks until it’s too late
According to Kaspersky Lab, many companies only notice that a cyber attack takes place when it is already too ...

Botnet with million infected computers taken over
The French police have taken over and neutralised a large botnet for cryptographic currency mining. The botnet...

Mining malware switches from Arm-IoT to Intel servers
A mining malware previously only seen on Arm-controlled Internet or Things (IoT) devices has made the switch t...