
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Serious vulnerabilities in two WordPress plugins abused
Attackers have exploited serious vulnerabilities in two commonly used WordPress plug-ins in the wild. These ar...

Researchers find 36 new vulnerabilities in the LTE protocol
A group of academics from South Korea has discovered 36 new vulnerabilities in the Long-Term Evolution (LTE) s...

GitLab now automatically alerts you to the merging of API keys in codebase
GitLab has announced that it will add confidentiality detection to version 11.9 of the service. This means tha...
Microsoft brings security program Defender ATP to macOS
Microsoft has made its Windows Defender Advanced Threat Protection (ATP) available for macOS systems. The secu...

Drinking water supply under pressure due to cyber attacks on critical infrastructure
It's World Water Day today. This year's theme: don't leave anyone behind. Providing everyone with drinking wat...

More than 100,000 GitHub repositories leak API keys
As part of an academic study, researchers scanned thirteen percent of all public GitHub repositories. The many...

Dell EMC: “Many companies don’t know how to adequately protect valuable data”.
Dutch IT decision makers know that data can potentially have a lot of value. However, most of them have diffic...

G Data brings Advanced Analytics service to companies
G Data makes the analytical and forensic expertise of its most advanced security team available to organizatio...

“Spear phishing where attackers pretend to be Microsoft common.
One of the most common forms of spear phishing attacks, is where attackers pretend to be someone from Microsof...

Ransomware LockerGoga flattens out Norsk Hydro aluminium group
Norsk Hydro, a Norwegian energy and aluminium producer, has been hit by a ransomware attack, which has shut do...