
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

800,000 systems still vulnerable to Bluekeep
Over 800,000 systems are still vulnerable to Bluekeep, states security company BitSight Technologies. This is ...

Phishing practices evolved: lateral phishing is latest threat
Barracuda reports on a new research in collaboration with the University of California (Berkeley and San Diego...

Companies are getting shadow IT under control more and more.
Companies are increasingly working to tackle shadow IT, according to research by Duo Security, which is part o...

Barracuda Cloud Security Guardian, one step beyond AWS Control Tower
More and more companies are opting for the cloud. They often start by virtualizing their virtual machines in ...

RDP attack patterns identified by Sophos
Sophos informs Techzine that it has identified patterns used by hackers in Remote Desktop Protocol (RDP) attac...

Fujitsu updates PalmSecure authentication
Fujitsu reports that the company's PalmSecure technology, which can biometrically identify individuals, will b...

Eight million files leaked from Elasticsearch database
Eight million files are on the street due to a configuration error in the Elasticsearch database of AavGo, a c...

“Most IT managers want to get rid of password authentication.
A study by MobileIron, the results of which are shared with Techzine, shows that eight out of ten IT managers ...

Vulnerability allows hackers to exploit iOS technology to log into apps
Trend Micro security researchers have found that hackers can use the iOS URL Scheme to launch attacks on certa...

Atlassian close critical remote code execution error in Jira Server
Atlassian released a patch for a critical vulnerability in Jira Server. Via the vulnerability CVE-2019-11581 a...