
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Ten billion passwords dumped on hacker forum BreachForums
Hackers recently posted a dump of nearly 10 billion passwords in plaintext on the hacker forum BreachForums. ...

Gigantic DDoS attack of 840 Mpps mitigated
OVHcloud managed to mitigate a DDoS attack totalling 2.5 Tbps on its systems in May this year. It peaked at 8...

NYT: Hacker stole details AI technology OpenAI
Access to the online forum for OpenAI employees has provided information about the design of AI technology. ...

Dutch government to invest further in cyber resilience
The Dutch government will spend more money in the coming years on campaigns to increase the cyber resilience ...

Half of businesses experience VPN-related attack
Figures from Zscaler show that in the past year, 56 per cent of organizations were targeted by attacks that e...

API endpoint of 2FA app Authy abused to obtain millions of phone numbers
Users of 2FA code generator Authy should update this app to the latest version as soon as possible. Due to an...

International police operation deletes hundreds of Cobalt Strike IP addresses
Nearly 600 IP addresses were recently taken offline during an international police operation. The operation i...

“Firewalls will become like mainframes, Zero Trust is the way forward”
Zscaler CEO Chaudhry sees that Zero Trust cannot be ignored.

Google patches critical Android vulnerability that allows for escalation of privileges
Google fixed a critical vulnerability in the Android Framework during the July patch period. CVE-2024-3132 al...

Rapid7 buys Noetic Cyber, but gets pressured to find an acquirer for itself
Rapid7 is acquiring the start-up Noetic Cyber, expanding its ability to discover and address vulnerabilities ...