
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

MacOS Gatekeeper security to bypass by vulnerability
A security researcher has discovered a leak that allows malware makers to bypass macOS Gatekeeper security to ...
Researchers discover Linux version of Winnti malware
Chronicle security researchers have discovered a Linux version of Winnti malware for the first time. According...

Bitdefender IntelliTriage monitors networks and analyzes network traffic
Bitdefender has launched a new solution for network monitoring and analysis of network traffic for businesses....

“Hacker group Fancy Bear uses backdoor Zebrocy in attacks.
Security researchers at ESET's R&D center in Montreal have discovered how the well-known hacker group Fanc...

Siemens and Alphabet subsidiary Chronicle protect energy infrastructure
Siemens AG has entered into a partnership with Chronicle, a subsidiary of Alphabet. The two parties will work ...
Ancient Ramnit-trojan refocuses arrows on financial institutions
According to security company F5 Labs, the Ramnit Trojan has refocused its efforts on the financial sector. Th...

Google saved some G Suite passwords as plaintext
Google accidentally stored some of the passwords of G Suite users as plaintext. The error that caused this hit...

Linksys routers leak historical data on connected devices
More than 20,000 Linksys routers regularly leak historical data from every device that has ever connected to t...

Hackers steal data from 113,000 other hackers
A group of hackers has attacked a popular forum among a community of its rivals. Nearly 113,000 forum users - ...

Many hacker-for-hire services are scammers or inefficient
Many online hacker-for-hire services are scammers or are very inefficient. This is shown by the recently publi...