
Memory-safe malware: Rust challenges security researchers
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Ivanti's Endpoint Management (EPM) software contains a critical vulnerability that allows hackers to hijack e...
The US law firm Orrick, Herrington & Sutcliffe, which specializes in data breaches, became the victim of ...
Victims of the Akira and Royal ransomware face additional extortion attempts. The methods used in the "follow...
A total ban on paying hackers in ransomware attacks is the only solution to this troublesome problem. This is...
Google recently fixed a critical vulnerability that allows hackers to remotely attack Android phones with a Q...
A hacker last week managed to take down the network of Orange España, the country's second-largest mobile op...
Mimecast is acquiring Elevate Security. The acquisition should have a beneficial effect on human-centred cybe...
Verified X 'Gold' accounts of the social media platform X are being taken over en masse by hackers. Subsequen...
SonicWall is acquiring SASE specialist Banyan Security. With this, the company aims to further expand its own...
A hacker gained access to the X account of Google subsidiary Mandiant to use it for a crypto scam. Mandiant h...