
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Research: Malware no longer biggest cyberthreat to SMBs
For SMBs, malware is surprisingly no longer the biggest cyberthreat. It is now primarily the use of legitimat...

FBI: ‘Citrix Bleed caused data breach at Boeing’
According to the U.S. intelligence agency FBI and security regulator CISA, the Citrix Bleed vulnerability is ...

Citrix Bleed vulnerability exploited before it was even discovered
The scope of the Citrix Bleed vulnerability is likely larger than thought. New insight suggests that the vuln...

Russian state hackers exploit WinRAR vulnerability
Russian state-affiliated hacker gang APT29 is exploiting the CVE-2023-38831 vulnerability in WinRAR 6.23 and ...

123456 most common password of 2023
'123456' has emerged as the most common password of 2023. NordPass' research again shows that password securi...

‘New ransomware gangs usually use multiple extortion techniques’
Most cyber-attacks continue to come from ransomware gangs. WithSecure's security specialists observe this aft...

CrowdStrike bundles threat hunting and intelligence to combat identity threat
CrowdStrike has been protecting customers from cyber attacks since 2011. However, where other vendors focused...

Intel patches Reptar vulnerability in Intel processors, which can cause data theft
Update 17-11-2023: Intel provided an official statement with regard to this vulnerability, which has been add...

Ransomware gang takes legal action against its victim
The well-known ALPHV/BlackCat ransomware gang is now also taking legal action against its victims by filing c...

Publicly accessible code is often full of credentials
Publicly accessible programming code is still often riddled with certain credentials that can give anyone a p...