Week in review

Week in review: Active Directory security, Patch Tuesday forecast, stopping lateral phishing attacks
Here’s an overview of some of last week’s most interesting news, interviews and podcasts: How can security teams effectively monitor OT and ICS networks? Modern …

Week in review: Keeping up with ransomware, critical PHP RCE exploited, DevOps firewall
Here’s an overview of some of last week’s most interesting news and articles: Leading domain name registrars suffered data breach Web technology company Web.com …

Week in review: Avast breach, deepfakes, VisibleV8 monitors JavaScript in the wild
Here’s an overview of some of last week’s most interesting news and articles: Phishing attacks are a complex problem that requires layered solutions Most cyber …

Week in review: Insider threat essentials, tracing IP hijackers, cryptojacking worm hits Docker hosts
Here’s an overview of some of last week’s most interesting news, reviews and articles: “Smart city” governments should also be smart about security While the …

Week in review: Umasking cybercriminals, improving incident response, macOS Catalina security
Here’s an overview of some of last week’s most interesting news and articles: Winning the security fight: Tips for organizations and CISOs If you ask Matthew …

Week in review: MFA effectiveness, SMBs and Win7 security, the quantum computing threat
Here’s an overview of some of last week’s most interesting news, interviews and articles: Unpatched Android flaw exploited by attackers, impacts Pixel, Samsung, …

Week in review: IE zero-day, S3 bucket security, rise of RDP as a target vector
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Cybersecurity automation? Yes, wherever possible Automated systems are …

Week in review: CISO do’s and don’ts, Windows Defender scan fail, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, articles and podcasts: CISO do’s and don’ts: Lessons learned Keeping a business safe from cyber …

Week in review: Simjacker attacks, critical Exim flaw, Sandboxie becomes freeware
Here’s an overview of some of last week’s most interesting news, interviews and articles: More than a year after GDPR implementation, half of UK businesses are not …

Week in review: Supply chain security, Android flaw opens users to advanced SMS phishing
Here’s an overview of some of last week’s most interesting news, articles and podcasts: How to reduce the attack surface associated with medical devices As the …

Week in review: Mass iPhone hacking, SSL VPNs under attack, SOC analysts overwhelmed
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Cybersecurity in the age of the remote workforce Users can be set up for a …

Week in review: Red teaming, quantum computing, blockchain innovation
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Quantum computing: The new moonshot in the cyber space race The race to …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility