
Microsoft set to withdraw direct kernel access from security software
Microsoft is preparing a major change to Windows that will fundamentally alter the way antivirus and endpoint...
Microsoft is preparing a major change to Windows that will fundamentally alter the way antivirus and endpoint...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Since the Hamas terrorist attack on Oct. 7, attacks by Iranian state hackers have been taking place aimed at ...
An advanced phishing campaign attacked hundreds of companies' Microsoft Azure accounts. Once the hackers got ...
Apple tries to keep its own App Store as secure as possible. While reports of Android malware circulate relat...
Email attacks using QR codes increased significantly in the last quarter of 2023. Researchers are concerned b...
Check Point's new next-generation firewalls are said to block 99.8 per cent of attacks. In the Quantum Spa...
Fortinet is again warning of a critical vulnerability, this time in FortiOS SSL VPN. The vulnerability enable...
Security researcher Stacksmashing managed to crack Microsoft's Bitlocker encryption in 43 seconds. To do so, ...
Commercial spyware vendors appear to be the largest developers of zero-day vulnerabilities. Through these vul...
Last year, more than $1.1 billion (€1 billion) in ransom payments were made following a cyber attack. This ...
The vulnerability allows hackers to execute code early in a device's boot. Virtually all Linux distributions ...