
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

xz-Utils available again on GitHub, creator investigates backdoor
The Linux data compression tool xz-Utils is available again through GitHub. Last month, a backdoor was discov...

Microsoft update fixes already exploited vulnerabilities
Microsoft has fixed a number of already exploited vulnerabilities in its monthly Patch Tuesday update. The mo...

Darktrace introduces ActiveAI Security Platform
The new platform is designed to visualize and investigate security incidents in cloud, email, network, endpoi...

Purple AI takes SentinelOne platform to the next level
Purple AI, the new generative AI addition to the SentinelOne platform is going to save a lot of time for secu...

Dutch hacker finds critical vulnerability in macOS
The process injection vulnerability allows access to webcams, microphones and sensitive information. Thijs...

Microsoft now offers a unified SecOps platform: what does it entail?
Microsoft is presenting a public preview of its unified security operations platform announced in November. T...

Microsoft reveals high prices for extended support for Windows 10
Windows 10 will no longer receive free security updates starting Oct. 14, 2025. Microsoft therefore recommend...

‘Cascade of errors’ enabled Chinese infiltration at Microsoft
Chinese hacker group Storm-0558's attack on Microsoft in 2023 should never have happened. That is the conclus...

xz backdoor shows how vulnerable open-source is to hackers playing the long game
A security leak in the Linux compression tool xz shows open-source systems' vulnerability to multi-year infil...

Google patches critical Android vulnerability for devices with Qualcomm chipsets
Google closed 28 leaks during the April Android patch cycle, including one critical one. This leak makes phon...