
Cisco wants to use AI to defend AI at machine scale
Cisco made a swath of announcements at RSAC 2025 Conference. Unsurprisingly, several of them had something to...
Cisco made a swath of announcements at RSAC 2025 Conference. Unsurprisingly, several of them had something to...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
VMware by Broadcom has disclosed two critical vulnerabilities in vCenter Server, a key component for managing...
An update to Sysdig's offering should save security teams a lot of time. New cloud-native detection features ...
Police in Spain have arrested a possible leader of the notorious Scattered Spider ransomware gang. The arrest...
Several models of Asus modem/Wi-Fi routers contain a vulnerability that allows hackers to take them over remo...
Cyber gang UNC3944, which according to cybersecurity firm Mandiant can be linked to recent attacks on Snowfla...
26 European industry groups warn that the European cybersecurity label for cloud services should not exclude ...
In this new episode of Techzine Talks on Tour, we take an inside-out look at cyber security. That is, we disc...
According to HashiCorp, setting up and managing cloud environments requires an industry standard. The company...
Hackers employ 201 attack techniques, of which SIEM tools cover only 19 percent. That's according to research...