
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Ransomware victims increasingly refuse to pay
Victims of ransomware attacks are less likely to pay cybercriminals to release the encrypted or stolen data. ...

How did Phishing-as-a-Service group LabHost operate?
With "Operation PhishOFF," phishing gang LabHost appears to have exited the cybercrime stage. This criminal g...

Java highly vulnerable relative to other programming languages
Among widely used programming languages, Java appears to be the most susceptible to third-party vulnerabiliti...

Cisco Hypershield: new security architecture protects against new (and old) problems
According to Cisco, what we need is not so much new security products, but a completely new architecture to b...

Cisco warns of brute-force attacks on VPN and SSH applications
Cisco security specialists are warning of brute-force attacks on VPN and SSH applications for their own devic...

Exploit in Palo Alto’s PAN-OS actively abused by malicious hacker group
A critical vulnerability in Palo Alto Networks' PAN-OS firewall software is actively exploited and used for a...

‘Vigilance required to counter infiltration attempts of open-source projects’
The backdoor in the Linux compression tool xz may not have been an isolated incident, say the Open Source Sec...

‘Nearly a third of all internet traffic involves malicious bots’
Bots appear to be flooding the Internet. According to Thales subsidiary Imperva's brand new Bad Bot Report, n...

Update: Beta release of Ubuntu 24.04 finally hits after more than a week’s delay
Update 15/04/2024 – The new beta version of Ubuntu, version 24.04 nicknamed 'Noble Numbat,' has been releas...

Akamai acquires Noname Security: an inevitable move for API security companies?
Noname Security is in talks with Akamai for a possible sale. The API security player would cost Akamai $500 m...