
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

400 million Office 365 accounts were vulnerable to hack
A misconfigured Microsoft subdomain seems to have exposed the accounts of 400 million Office 365 users to a po...

“Equifax hack was completely preventable with basic security measures.
According to a report by the American House Oversight Committee, the hack at Equifax in 2017 was completely pr...

Google+ hit by huge bug; faster offline
Google+ did not succeed when it was still alive, but now that the plug has been pulled out of the social netwo...

There’s no evidence against Huawei about Chinese espionage…
Lu Kang, spokesman for Foreign Affairs in China, is unhappy about the global accusations against Huawei. The r...

New macro downloaders use PUB files to attack retailers
Trend Micro researchers state that new macro downloaders are using Microsoft Publisher (PUB) files and spam ma...

“At least 1,300 Dutch directors targeted by hackers who commit CEO fraud.
At least thirteen hundred Dutch financial directors are victims of a hacker group. The hacker group London Blu...

22 many downloaded Android apps include a rogue backdoor
Sophos researchers have found 22 apps with over 2 million downloads from the Google Play Store that contain a ...

ESET discovers 21 new malware families targeting Linux
Security company ESET has announced that it has discovered 21 new Linux-based malware families. All families w...
“86 percent of CISOs consider cyber intrusions inevitable.
According to 86% of the CISOs working for large organisations, cyber intrusions are inevitable. That's what a ...

Trend Micro: ‘IoT message protocols are poorly protected’.
Trend Micro states that two of the most commonly used machine-to-machine (M2M) protocols have major design fla...