
Dutch lab paid off cybercriminals, but full-scale data leak looms
The Nova hacker group already received a ransom payment from its victim Clinical Diagnostics. This appears to...
The Nova hacker group already received a ransom payment from its victim Clinical Diagnostics. This appears to...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Barracuda has released a new total solution for email protection, which includes the company's complete offeri...
Cloudflare wants to use a new technology to prevent internet routing problems from occurring. By installing a ...
If you have a Windows computer with a touch screen, there's a good chance that your device has been collecting...
After the experiences of the previous American Presidential elections, in which fake news was disseminated on ...
Microsoft released a patch for FragmentSmack. The attack drives the CPU consumption of a Windows system up to ...
BlackBerry Limited and Check Point Software Technologies have started a global partnership. By doing so, the c...
A security researcher has found a new way to crash and restart iPhones. For that, he only needed a few lines o...
Zscaler Private Access (ZPA) is the first zero trust architecture to be awarded the AWS Security Competency st...
ESET states that its analysts have discovered that add-ons for the open-source media player Kodi are infected ...
Personal mobile devices are the biggest threat to a business network. Although employees work from home, or li...