Week in review

Week in review: The future of DNS security, acquiring cyber talent in 2020, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Shadow IT accounts with weak passwords endanger organizations 63% of enterprise …

Week in review: Most exploited vulns in 2019, Emotet sprads via Wi-Fi, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: CDPwn vulnerabilities open millions of Cisco enterprise devices to attack If you have …

Week in review: UN hacked, new Kali Linux release, Win7 upgrade dilemma
Here’s an overview of some of last week’s most interesting news and articles: Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more! Offensive …

Week in review: Kubernetes security challenges, NIST Privacy Framework, Mitsubishi Electric breach
Here’s an overview of some of last week’s most interesting news and articles: Mitsubishi Electric discloses data breach, possible data leak Japanese multinational …

Week in review: Windows crypto flaw, API security risks, exploits for Citrix security hole abound
Here’s an overview of some of last week’s most interesting news and articles: Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking A …

Week in review: Citrix bug under attack, Windows 7 ransomware risk, ATT&CK for ICS
Here’s an overview of some of last week’s most interesting news and articles: Travelex extorted by ransomware gang, services still offline a week after the hit On …

Week in review: Worst passwords of 2019, the end of Windows 7, 2020 cybersecurity trends
Here’s an overview of some of last week’s most interesting news and articles: Worst passwords of 2019: Are you using one of them? SplashData released their “Worst …

Week in review: AD password reset best practices, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: DNS over HTTPS’ threat to enterprise security DNS over HTTPS (DoH) is here, …

Week in review: 5G IoT security, efficient password cracking for pentesters, supply chain examination
Here’s an overview of some of last week’s most interesting news and articles: 5G IoT security: Opportunity comes with risks Slowly but surely, 5G digital cellular …

Week in review: The data skills gap, new Kali Linux release, Apache Solr RCEs with public PoCs
Here’s an overview of some of last week’s most interesting news and articles: The overlooked part of an infosec strategy: Cyber insurance underwriting When a data …

Week in review: Public cloud performance, new G Suite security options, how to build a successful SOC?
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Women in cybersecurity can benefit from taking inventory of their personal …

Week in review: How to avoid lateral phishing, what’s the right time to red team?
Here’s an overview of some of last week’s most interesting news and articles: Your supplier’s BEC problem is your BEC problem BEC scammers don’t care what business …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility