
Data breach involving 16 billion credentials is not what it seems
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
A security researcher has discovered a leak that allows malware makers to bypass macOS Gatekeeper security to ...
Chronicle security researchers have discovered a Linux version of Winnti malware for the first time. According...
Bitdefender has launched a new solution for network monitoring and analysis of network traffic for businesses....
Security researchers at ESET's R&D center in Montreal have discovered how the well-known hacker group Fanc...
Siemens AG has entered into a partnership with Chronicle, a subsidiary of Alphabet. The two parties will work ...
According to security company F5 Labs, the Ramnit Trojan has refocused its efforts on the financial sector. Th...
Google accidentally stored some of the passwords of G Suite users as plaintext. The error that caused this hit...
More than 20,000 Linksys routers regularly leak historical data from every device that has ever connected to t...
A group of hackers has attacked a popular forum among a community of its rivals. Nearly 113,000 forum users - ...
Many online hacker-for-hire services are scammers or are very inefficient. This is shown by the recently publi...