Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
CISA: Oracle vulnerability is being actively exploited
The US cybersecurity agency CISA has added a serious vulnerability in Oracle E-Business Suite to its list of ...
The state of security in 2025
The security landscape is changing rapidly. Whereas IT security used to be a topic exclusive to technicians, ...
Veeam acquires Securiti AI for $1.7 billion
Veeam Software is acquiring Securiti AI for $1.725 billion (€1.487 billion). The acquisition aims to combin...
Sophos launches Identity Threat Detection for XDR platform
Sophos has launched Identity Threat Detection and Response (ITDR) for its XDR and MDR platforms. The solution...
Google Ads lead macOS developers to malware
A new wave of macOS attacks is targeting developers via fake download websites that look like legitimate plat...
Hackers were two years inside F5: traces erased
Chinese state hackers infiltrated the systems of cybersecurity company F5 at the end of 2023 and remained und...
266,000 F5 BIG-IP systems vulnerable
A scan has revealed that more than 266,000 F5 BIG-IP instances are accessible from the internet due to the se...
Hackers exploit Cisco vulnerability to install rootkit on switches
A new attack campaign, dubbed Operation Zero Disco by Trend Micro , exploits a vulnerability in Cisco's Simpl...
North Korea uses blockchains as indelible malware hosts
North Korean threat actor UNC5342 is using a new technique to spread malware via public blockchains: EtherHid...
Critical infrastructure struggles with AI and quantum threats
Critical infrastructure organizations are facing a new wave of cyber risks. Although the number of data breac...