Week in review
![corporate cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105250/corporate-cloud-400x200.jpg)
Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free
Here’s an overview of some of last week’s most interesting news and articles: Researchers link Industroyer to NotPetya ESET researchers believe they have found …
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100143/complex-1-400x200.jpg)
Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors
Here’s an overview of some of last week’s most interesting news and articles: APTs are targeting IT service providers Managed service providers (MSPs) and cloud …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195355/general_red-400x200.jpg)
Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures
Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102617/phishing-400x200.jpg)
Week in review: Shifting security priorities, phishing manipulation tactics, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Why identity verification needs to be a part of your digital transformation strategy …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103451/women-in-cybersecurity-400x200.jpg)
Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage
Here’s an overview of some of last week’s most interesting news and articles: What can we do to reverse the cybersecurity skills shortage? Having a strong pipeline …
![arrow](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112324/arrow2-400x200.jpg)
Week in review: BA breach, Magento sites under attack
Here’s an overview of some of last week’s most interesting news and articles: How metrics can enhance the effectiveness of security programs Choosing the right …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101149/abstract-400x200.jpg)
Week in review: Blocking compromised passwords, removing personal data from connected cars
Here’s an overview of some of last week’s most interesting news and articles: 0patch releases micropatch for Windows Task Scheduler zero-day Acros Security, the …
![red](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101022/red-400x200.jpg)
Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing
Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113919/abstract3-400x200.jpg)
Week in review: Office 365 phishing, compromising networks with malicious faxes
Here’s an overview of some of last week’s most interesting news and articles: AT&T sued for enabling SIM swap fraud A cryptocurrency investor is suing …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111503/abstract-arrows-400x200.jpg)
Week in review: IoT security, cyber hygiene, Social Mapper
Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: Choosing your defensive strategy One of the biggest …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113120/gears-400x200.jpg)
Week in review: Deploying automation securely, dark web activities that indicate a breach
Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting …
![SF](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104041/sf-400x200.jpg)
Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning
Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege