Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Patch Tuesday fixes 6 actively exploited vulnerabilities
Microsoft's August Patch Tuesday update fixed 89 vulnerabilities. Among them were ten zero-day vulnerabilitie...
0.0.0.0-day in Chrome, Safari and Firefox is finally closed
Not a zero-day, but a 0.0.0.0-day
Gemini 1.5 Pro uncovers complex vulnerabilities
GenAI becomes a security researcher
Smartphones vulnerable due to Qualcomm GPU drivers, Google discovers
Android drivers for the Qualcomm Adreno GPU had at least nine vulnerabilities. Numerous smartphones were vuln...
Ransomware victims recover data for free due to hackers’ bugs
According to research by Atropos.ai, six companies have escaped paying ransom for a ransomware attack because...
Trend Micro investigates possible sale after poor stock market figures
Trend Micro is exploring a possible sale. This move is a reaction to the interest in a buyout of several part...
SentinelOne and Google Cloud deepen partnership towards autonomous security
Integrations between security vendors are crucial to getting organizations' cyber resilience right. SentinelO...
State-sponsored hackers like to set up shop in legitimate cloud services
A safe place for everyone, including criminals
Rubrik and Mandiant join hands to secure backups
Security company Rubrik is integrating threat detection technology from Mandiant into its backup solutions. T...