Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Kaseya acquires INKY for AI-driven email security
Kaseya is acquiring INKY to better equip managed service providers (MSPs) against advanced phishing attacks. ...
Red Hat leak escalates: ShinyHunters demands money after GitLab breach
The cyberattack on software company Red Hat has taken a new turn, with the hacker group ShinyHunters now join...
Oracle patches actively exploited zero-day vulnerability in E-Business Suite
Oracle has patched a critical vulnerability in E-Business Suite that was actively exploited in data theft att...
Cyber gang demands billion to prevent Salesforce data leak
A cyber gang that previously announced it was disbanding has reemerged with a massive extortion threat target...
Minimizing liability is not the same as security: Lessons learned from Collin’s Aerospace cyberattack
Key points: A ransomware attack targeting the ARINC vMUSE systems at Collin’s Aerospace caused widesp...
Veeam wants to acquire Securiti to expand data protection
Veeam Software, a leader in data protection and backup software, is set to acquire the American software deve...
What we know so far about Red Hat’s GitLab instance breach
Red Hat is investigating a security incident involving a self-managed GitLab Community Edition instance used ...
Japanese Asahi factories shut down after cyberattack
Japanese beverage producer Asahi is facing serious disruptions after a cyberattack. Since the beginning of th...
IoT routers driving SMS phishing
Researchers at Sekoia.io have found that cybercriminals are exploiting Milesight cellular routers on a large ...
Exabeam Nova guides security teams with peer benchmark data
Exabeam introduces security posture benchmarking within Nova, enabling security teams to anonymously compare ...