Week in review

Week in review: New DNS vulnerabilities, benefits of cyber threat intelligence, FBI removes web shells
Here’s an overview of some of last week’s most interesting news, articles and podcast: New DNS vulnerabilities have the potential to impact millions of devices Forescout …

Week in review: SAP apps under attack, Zero Trust creator talks, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and reviews: SAP applications are getting compromised by skilled attackers Newly provisioned, …

Week in review: PHP supply chain attack, common zero trust traps, hardening CI/CD pipelines
Here’s an overview of some of last week’s most interesting news and articles: Attackers tried to insert backdoor into PHP source code The PHP development team has averted an …

Week in review: Phishers’ perfect targets, evaluating partner cyber resilience, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Microsoft offers rewards for security bugs in Microsoft Teams Microsoft is starting a new …

Week in review: Attacks on Exchange servers escalate, the influence of the Agile Manifesto, O365 phishing
Here’s an overview of some of last week’s most interesting news and articles: Ongoing Office 365-themed phishing campaign targets executives, assistants, financial departments …

Week in review: Keeping serverless architecture secure, trends influencing remote work in 2021
Here’s an overview of some of last week’s most interesting news and articles: March 2021 Patch Tuesday: Microsoft fixes yet another actively exploited IE zero-day …

Week in review: Exchange Servers under attack, disinformation economics, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: How do I select a cloud security solution for my business? To select a suitable cloud …

Week in review: Kali Linux 2021.1, CNAME-based tracking, VMware vCenter Servers under attack
Here’s an overview of some of last week’s most interesting news and articles: Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP! …

Week in review: Most used MITRE ATT&CK tactics, boosting the “Sec” in DevSecOps
Here’s an overview of some of last week’s most interesting news and articles: Nearly 40% of consumers lost money to phone scams in 2020 Businesses and consumers …

Week in review: Improving vulnerability triage, RDP attacks soaring, hackers in high demand
Here’s an overview of some of last week’s most interesting news and articles: Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack Forescout …

Week in review: Top 10 most exploited vulns, SMB ransomware extortion, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: SolarWinds Orion exploited by another group of state-sponsored hackers Another group …

Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing
Here’s an overview of some of last week’s most interesting news and articles: “Serious” vulnerability found in Libgcrypt, GnuPG’s cryptographic library Libgcrypt …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility