Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Microsoft 365 users attacked via Rockstar 2FA
The new Phishing-as-a-Service platform Rockstar 2FA is attempting to gain access to Microsoft 365 accounts. T...
Cybercriminals are paying pentesters to vet their ransomware
Through advertisements on cybercrime marketplaces, ransomware groups are looking for pentesters. It's another...
Microsoft fixes Exchange Server issue after November 2024 Security Update
Microsoft recently resolved an issue that occurred after the November 2024 Security Update for Exchange Serve...
First UEFI bootkit ever built for Linux discovered
ESET has discovered the first proof-of-concept UEFI bootkit malware for Linux: Bootkitty. This is the first t...
CrowdStrike still doesn’t know months later how much outage will cost
It remains difficult to tell the financial impact of the CrowdStrike outage that affected millions of compute...
AWS introduces updates to Amazon Cognito
New features have been added to Amazon Web Services' (AWS) identity and access management platform to help de...
Arctic Wolf CEO: “Platform is what customers are really looking for”
The security platform is gaining traction
The industrial sector is under cyber attack: what can be done about it?
Prevention is being dismissed as fantasy
Too much data shared with Copilot, Microsoft pulls the brake
A Microsoft 365 Copilot deployment blueprint should limit sharing sensitive business information with the AI ...
Hackers exploit two zero-days in Palo Alto firewalls
PAN-OS Firewalls from Palo Alto Networks have been hit by two zero-day vulnerabilities. They are now being ac...