
AI and application security: time savings and trust issues
Amidst the excitement surrounding AI, widespread misconceptions exist about its capabilities and limitations. Let us explore more.

From boots to bytes: a strategic shift in the Dutch military
This week, Defense Secretary Gijs Tuinman presented the Netherlands’ new digital transformation strategy to the House of Representatives. The strategy is designed to enhance the military’s digital capabilit

Dutch government commits 70 million euros to AI factory in Groningen
The Dutch government has announced a €70 million investment in a new artificial intelligence factory to be established in the city of Groningen.

TU Eindhoven hack highlights urgency of closing basic security gaps
The cyber attack on Eindhoven University of Technology (TU/e) in January was largely due to known vulnerabilities and human errors, a research report by Fox-IT showed.

The hidden complexity of privileged access management
Implementing Privileged Access Management (PAM) in hybrid IT environments is rarely straightforward.

Grounds for concern: new malware CoffeeLoader surfaces
A new and highly evasive malware family, dubbed CoffeeLoader, has been uncovered. First detected in the wild around September 2024, the malware is designed to download and execute second-stage payloads.

Lockbit hack exposes negotiations
The cybercriminal group Lockbit seems to have suffered a breach of their own, cybersecurity media have reported.

Offensive cyber operations on the rise - AIVD 2024 annual report
Over the past three years, the number of countries developing its offensive cyber operations has sharply increased, the AIVD states in its 2024 annual report.

Compromised credentials remain leading cause of breaches
Cyberattacks are evolving, and so must defenses: that’s the overarching message found in Sophos’ 2025 Active Adversary Report.

Global solar power infrastructure at risk of remote sabotage
As the world moves toward renewable energy, the spotlight is increasingly turning to the digital systems that enable this transformation.