
Memory-safe malware: Rust challenges security researchers
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
An undocumented feature in the Apple SoCs of iPhones has been a key component in a prominent spyware campaign...
Three German hospitals are victims of a ransomware attack. For security reasons, all systems have been shut d...
The biggest data breaches of all time almost all took place between 2018 and 2020. Since then, no leak has ma...
The so-called Chameleon malware is not new, but it has worrying new capabilities. Android users can download ...
Europol announces that credit card data from 443 online stores from 17 countries has been stolen. Seventeen c...
Google is working on the security of the Chrome browser for the desktop. The functionality of the feature is ...
The number of ransomware attacks continues to increase worldwide. This is despite a previous dip in the numbe...
Security Datalake is taking on an increasingly central role in SentinelOne's offerings. XDR and the new Purpl...
Ivanti recently patched as many as fourteen critical security vulnerabilities in its enterprise MDM solution ...
A new phishing method aims to sidestep the two-step verification of Instagram accounts. A misleading email me...