Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Arctic Wolf acquires UpSight Security for ransomware prevention in Aurora
Arctic Wolf will expand the Aurora endpoint platform with ransomware prevention and rollback capabilities thr...
Invisible malware spread via VS Code extensions
Update November 6: The leak has now been fixed. According to the Open VSX team, the incident has been fully c...
What does it mean to be “Safer with Yealink”?
What does it mean to be "safer with Yealink", as the company's slogan suggests? A combination of five commitm...
Cybercriminals are using AI in increasingly sophisticated ways, says Google
The threat posed by artificial intelligence in the hands of malicious actors is becoming increasingly real. T...
Cybersecurity needs more women
Cybersecurity has become an indispensable part of every organization. As threats become more complex and digi...
SentinelOne integrates its acquisitions and protects AI with AI
OneCon, SentinelOne's annual event, focuses on both protecting AI workloads and using AI to protect organizat...
Pro-Russian hackers hide in Windows with Linux VMs
A recent investigation by Bitdefender reveals how the pro-Russian hacker group Curly COMrades uses innovative...
Microsoft discovers backdoor that exploits OpenAI API
Microsoft researchers discovered a backdoor that exploits the OpenAI Assistants API for command-and-control c...
Hackers exploit vulnerability in JobMonster WordPress theme
Hackers are actively exploiting a serious security vulnerability in the popular JobMonster WordPress theme. T...
RMM software: a new weapon for cargo theft
Cybercriminals are increasingly targeting companies in the transport and logistics sector by misusing managem...