Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
AMD releases security update for Ryzen CPUs with TPM vulnerability
Last month, the Trusted Computing Group (TCG), the developer of the Trusted Platform Module (TPM) security st...
Even paying victims lose their data with Anubis ransomware
A wiper module makes the Akira ransomware more effective than before. Even if victims pay the ransom, they lo...
Zero-click attack reveals new AI vulnerability
Echoleak is a new attack vector that exploits AI assistants by subtly manipulating prompts. The attack was ex...
DNS analysis reveals links between VexTrio and WordPress hackers
New findings from Infoblox show that WordPress hackers and Traffic Distribution System operators associated w...
How a fake cybersecurity firm became a real threat
The Job Offer You Can’t Believe (And Probably Shouldn't)
Pentesting tool exploited in large-scale attacks
Cybercriminals are using the TeamFiltration pentesting tool in a large-scale campaign targeting Office 365 ac...
SentinelOne joins AWS ISV program to secure software migrations
When customers want to migrate software from other cloud environments or on-premises environments to AWS, the...
Microsoft fixes connection issues in Windows Server 2025
Microsoft has resolved an issue that caused certain Windows Server 2025 domain controllers to become unreacha...
Microsoft closes only one of two discovered Secure Boot bypasses
Researchers discovered two publicly available methods that allow attackers to bypass Secure Boot security com...
Microsoft makes Outlook safer with more attachment blocking
Starting in July, two new file types will be blocked in Microsoft Outlook. The .library-ms and .search-ms ext...