Week in review

Week in review: BootHole, RCEs in industrial VPNs, the cybersecurity profession crisis
Here’s an overview of some of last week’s most interesting news, articles, interviews and reviews: Attackers are exploiting Cisco ASA/FTD flaw in search for …

Week in review: PoC for wormable SharePoint RCE released, how to select a DMARC solution
Here’s an overview of some of last week’s most interesting news and articles: Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into …

Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications
Here’s an overview of some of last week’s most interesting news and articles: New wave of attacks aiming to rope home routers into IoT botnets A Trend Micro …

Week in review: MongoDB attacks, hackers hitting F5 BIG-IP, Citrix devices, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and reviews: Attackers are probing Citrix controllers and gateways through recently …

Week in review: MacOS ransomware, attackers bypassing WAFs, how to select a SIEM solution
Here’s an overview of some of last week’s most interesting news, articles and reviews: Critical flaw opens Palo Alto Networks firewalls and VPN appliances to …

Week in review: The economics of security research, SOC teams battle with burnout
Here’s an overview of some of last week’s most interesting news and articles: SOC team members battle with burnout, overload and chaos While some organizations …

Week in review: DDoS attack trends, WannaCry lessons, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Zero-day flaws in widespread TCP/IP library open millions of IoT devices to remote …

Week in review: SMBGhost exploit, OneDrive security, PCI compliance misconceptions
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Organizations are creating the perfect storm by not implementing security …

Week in review: Zoom end-to-end encryption, 5G adoption and security, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: VMware Cloud Director vulnerability enables a full cloud infrastructure takeover A …

Week in review: Windows RDP backdoor, GDPR enforcement, application threats and security trends
Here’s an overview of some of last week’s most interesting news and articles: How do I select a backup solution for my business? In order to select an appropriate …

Week in review: EasyJet breach, shadow IT risks, phishers bypassing Office 365 MFA
Here’s an overview of some of last week’s most interesting news and articles: The dark web is flooded with offers to purchase corporate network access In Q1 2020, …

Week in review: Kali Linux 2020.2, sensor-based ransomware detection, 10 most exploited vulns
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Have you patched these top 10 routinely exploited vulnerabilities? The US …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility