Week in review

Week in review: 5 popular cybersecurity exploitation techniques, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 69 released (IN)SECURE Magazine is a free …

Week in review: How to improve your AD security posture, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: July 2021 Patch Tuesday forecast: Don’t wait for Patch Tuesday There’s been lots of …

Week in review: PoC for Windows Print Spooler flaw leaked, conquering synthetic identity fraud
Here’s an overview of some of last week’s most interesting news and articles: PoC for critical Windows Print Spooler flaw leaked Microsoft has confirmed that the …

Week in review: Preventing ransomware attacks, SOC burnout, and customizing your ATT&CK database
Here’s an overview of some of last week’s most interesting news and articles: Vulnerabilities in Dell computers allow RCE at the BIOS/UEFI level An estimated 30 …

Week in review: VPN attacks up nearly 2000%, Root of Trust for the cloud era
Here’s an overview of some of last week’s most interesting news and articles: Unprotected CVS database exposed sensitive customer searches Researchers have …

Week in review: Kali Linux 2021.2, the human cost of understaffed SOCs, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2021.2 released: Kaboxer, Kali-Tweaks, new tools, and more! Offensive …

Week in review: VMware critical updates, prevalent enterprise cybersecurity risks, 3 years of GDPR
Here’s an overview of some of last week’s most interesting news and articles: Belgium’s Interior Ministry uncovers 2-year-long compromise of its network Belgium’s Federal …

Week in review: Dealing with ransomware attacks, detecting use of stolen API credentials inside AWS
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Vulnerability in popular browsers could be used to track, profile users online A …

Week in review: Top security threats for power plants, defending against Windows RDP attacks
Here’s an overview of some of last week’s most interesting news and articles: Why threat hunting is obsolete without context Threat hunting is one of the more recent …

Week in review: Patch Tuesday forecast, how to select a DLP solution, is it OK to publish PoC exploits?
Here’s an overview of some of last week’s most interesting news, articles and interviews: 21 vulnerabilities found in Exim, update your instances ASAP! A code audit of Exim, a …

Week in review: QNAP NAS ransomware, threat modeling, the realities of working in cybersecurity
Here’s an overview of some of last week’s most interesting news, articles and interviews: Attackers can teach you to defend your organization against phishing Using the kill …

Week in review: Pulse Secure zero-day actively exploited, how to select an IAM solution
Here’s an overview of some of last week’s most interesting news, articles and interviews: Infosecurity transformation and building proactive mitigation strategies In this …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility