Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Cybercriminals are circumventing multi-factor authentication
Multi-factor authentication (MFA) is no longer the strong line of defense it used to be. Although MFA has lon...
Proofpoint strengthens position in MSP market with acquisition of Hornetsecurity
Proofpoint has announced the acquisition of Hornetsecurity, a German security provider that focuses primarily...
Chrome vulnerability allowing account takeover fixed
Google has released an emergency update for the Chrome browser to fix a serious security vulnerability. This ...
Ransomware groups join attacks on SAP NetWeaver
Ransomware groups are now also exploiting ongoing attacks on SAP NetWeaver. They are taking advantage of a cr...
Europe launches its own security database following CVE uncertainty
The European cybersecurity agency ENISA has launched the European Vulnerability Database (EUVD). This new ser...
Intel’s Spectre defense against data leaks fails again
Researchers at ETH Zurich in Switzerland have tried to circumvent Intel's security measures against Spectre. ...
SAP releases patch for second zero-day vulnerability in NetWeaver
SAP has released security updates to address a second vulnerability recently exploited in attacks on SAP NetW...
Sysdig donates Stratoshark to Wireshark Foundation for cloud security
Sysdig has donated Stratoshark, an open source tool for cloud forensics, to the Wireshark Foundation. The don...
Cato Networks introduces AI for SASE policy optimization
Cato Networks introduces Cato Autonomous Policies, a new AI feature within the Cato SASE Cloud Platform. It o...
Leaked LockBit chats reveal how professional ransomware group operates
A major data leak has exposed the inner workings of the notorious ransomware group LockBit. The leak contains...