Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Hackers use Visio files to spread phishing links
Hackers are increasingly using files for Microsoft Visio to lure unsuspecting computer users to phishing site...
Hackers spread malware via Windows game development tools
Hackers are attempting to spread the malicious software framework Winos4.0 to Windows endpoints via game-rela...
Nokia: ‘Hackers did not obtain critical data’
Update 8/11: Nokia ends the first days of the investigation with positive news. According to the company, the...
Flaw in Cisco product gives unauthorized users admin privileges
Cisco reports a major security flaw in its Ultra-Reliable Wireless Backhaul systems. An unauthorized person i...
‘Pygmy Goat’ malware helps Chinese state hackers attack networks
Chinese state hackers are using the Linux malware 'Pygmy Goat' in their continuous campaigns against governme...
CrowdStrike outage costs Air France-KLM 15 million more than expected
Total cost: 25 million euros
Interpol takes down thousands of malicious IP addresses and servers
In the global action Operation Synergia II, Interpol managed to take down more than 22,000 maliciously used I...
Google Cloud will make MFA mandatory by 2025
Reducing the chance of hacks by 99 percent
Cegeka will offer managed PAM solution
Cegeka offers a new service that helps organizations protect and manage their most sensitive accounts. Accord...