
The state of security in 2025
The security landscape is changing rapidly. Whereas IT security used to be a topic exclusive to technicians, ...
The security landscape is changing rapidly. Whereas IT security used to be a topic exclusive to technicians, ...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Snyk introduces Evo, an agentic security orchestration system for AI-native applications. The platform is des...
A new cyber threat is affecting developers worldwide who work with Visual Studio Code. Researchers at Koi Sec...
Microsoft is once again facing a serious security threat. The US Cybersecurity and Infrastructure Security Ag...
The US cybersecurity agency CISA has added a serious vulnerability in Oracle E-Business Suite to its list of ...
The security landscape is changing rapidly. Whereas IT security used to be a topic exclusive to technicians, ...
Veeam Software is acquiring Securiti AI for $1.725 billion (€1.487 billion). The acquisition aims to combin...
Sophos has launched Identity Threat Detection and Response (ITDR) for its XDR and MDR platforms. The solution...
A new wave of macOS attacks is targeting developers via fake download websites that look like legitimate plat...
Chinese state hackers infiltrated the systems of cybersecurity company F5 at the end of 2023 and remained und...
A scan has revealed that more than 266,000 F5 BIG-IP instances are accessible from the internet due to the se...