
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

World Health Organization targeted in advanced cyber attack
The World Health Organization (WHO) was attacked by elite hackers earlier this month. Reuters reports this ba...

Windows: ‘Two vulnerabilities in all versions, no patch ready yet’
Two vulnerabilities in Windows have been identified by Microsoft itself, while the tech giant is working on a...

New version of Mirai malware focuses on NAS devices
A new variant of the Mirai malware focuses on a vulnerability in network attached storage (NAS) and uses that...

Aqua Security’s Trivy now scans multiple container platforms
Aqua Security, a startup for container security, indicates that its open source tool Trivy for scanning conta...

Trend Micro zero-days abused by hackers
Hackers have attempted to exploit two zero-day vulnerabilities in Trend Micro solutions. The company reported...

‘TrojAI framework can test cyber attacks on AI models’
Researchers at John Hopkins University in the United States have developed a set of TrojAI tools for 'arming'...

Hospitals and healthcare providers under fire with ransomware attacks
Hackers are currently targeting hospitals and healthcare providers with ransomware attacks, while many of tho...

Phishers adapt to surge in home workers due to corona virus
A significant increase in phishing campaigns has been observed by Mimecast Threat Intelligence, as more peopl...

Intel CPUs vulnerable to new ‘snoop’ attack
A software engineer from AWS found a new vulnerability in existing Intel CPUs that allows attackers to extrac...

‘Malware campaign is hacking cybercriminals’
Hackers are getting a taste of their own medicine, according to a recent malware campaign discovered by secur...