Week in review
Week in review: VPN attacks up nearly 2000%, Root of Trust for the cloud era
Here’s an overview of some of last week’s most interesting news and articles: Unprotected CVS database exposed sensitive customer searches Researchers have …
Week in review: Kali Linux 2021.2, the human cost of understaffed SOCs, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2021.2 released: Kaboxer, Kali-Tweaks, new tools, and more! Offensive …
Week in review: VMware critical updates, prevalent enterprise cybersecurity risks, 3 years of GDPR
Here’s an overview of some of last week’s most interesting news and articles: Belgium’s Interior Ministry uncovers 2-year-long compromise of its network Belgium’s Federal …
Week in review: Dealing with ransomware attacks, detecting use of stolen API credentials inside AWS
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Vulnerability in popular browsers could be used to track, profile users online A …
Week in review: Top security threats for power plants, defending against Windows RDP attacks
Here’s an overview of some of last week’s most interesting news and articles: Why threat hunting is obsolete without context Threat hunting is one of the more recent …
Week in review: Patch Tuesday forecast, how to select a DLP solution, is it OK to publish PoC exploits?
Here’s an overview of some of last week’s most interesting news, articles and interviews: 21 vulnerabilities found in Exim, update your instances ASAP! A code audit of Exim, a …
Week in review: QNAP NAS ransomware, threat modeling, the realities of working in cybersecurity
Here’s an overview of some of last week’s most interesting news, articles and interviews: Attackers can teach you to defend your organization against phishing Using the kill …
Week in review: Pulse Secure zero-day actively exploited, how to select an IAM solution
Here’s an overview of some of last week’s most interesting news, articles and interviews: Infosecurity transformation and building proactive mitigation strategies In this …
Week in review: New DNS vulnerabilities, benefits of cyber threat intelligence, FBI removes web shells
Here’s an overview of some of last week’s most interesting news, articles and podcast: New DNS vulnerabilities have the potential to impact millions of devices Forescout …
Week in review: SAP apps under attack, Zero Trust creator talks, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and reviews: SAP applications are getting compromised by skilled attackers Newly provisioned, …
Week in review: PHP supply chain attack, common zero trust traps, hardening CI/CD pipelines
Here’s an overview of some of last week’s most interesting news and articles: Attackers tried to insert backdoor into PHP source code The PHP development team has averted an …
Week in review: Phishers’ perfect targets, evaluating partner cyber resilience, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Microsoft offers rewards for security bugs in Microsoft Teams Microsoft is starting a new …
Featured news
Resources
Don't miss
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams