
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Snyk acquires Invariant Labs for AI security
Snyk is strengthening its AI Trust Platform with the acquisition of security research platform Invariant Labs...


Thales covers data security entirety thanks to Imperva
A year and a half after Thales acquired data and application security company Imperva, the two technologies h...

Thales introduces API security against BOLA attacks
Thales has announced new detection and response capabilities for the Imperva Application Security platform, d...

Okta Cross App Access brings OAuth to agents
Due to the explosion of AI agents, an extension of the OAuth protocol is needed. Okta wants to respond to the...

Pro-Russian hacker group claims attack on Dutch government websites
A cyberattack disrupted the service used by municipalities and provinces to publish official documents on Mon...

Russian hackers bypass Gmail MFA with stolen app passwords
Midnight Blizzard strikes again

Godfather Android malware takes over banking apps
A new version of the Android malware Godfather creates isolated virtual environments on mobile devices to ste...

Data breach involving 16 billion credentials is not what it seems
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...

Attackers exploit Linux vulnerability with PoC exploit
CISA warns US federal agencies about attackers targeting a serious security flaw in the OverlayFS submodule o...