Week in review
Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing
Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing …
Week in review: Office 365 phishing, compromising networks with malicious faxes
Here’s an overview of some of last week’s most interesting news and articles: AT&T sued for enabling SIM swap fraud A cryptocurrency investor is suing …
Week in review: IoT security, cyber hygiene, Social Mapper
Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: Choosing your defensive strategy One of the biggest …
Week in review: Deploying automation securely, dark web activities that indicate a breach
Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting …
Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning
Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control …
Week in review: Zero-login, Magecart threat, cybersecurity expert shortage
Here’s an overview of some of last week’s most interesting news and articles: Dealing with a system launch: It requires more than just testing Rolling out new IT …
Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps
Here’s an overview of some of last week’s most interesting news: How to allocate budget for a well-rounded cybersecurity portfolio What should a well-rounded …
Week in review: New LTE attacks, common API vulnerabilities, risk management trends
Here’s an overview of some of last week’s most interesting news: Four common API vulnerabilities and how to prevent them One of the main purposes of an API is to …
Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3
Here’s an overview of some of last week’s most interesting news and articles: How Facebook and Google nudge users to make anti-privacy choices Facebook, Google and …
Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Cisco plugs critical flaws in many switches, security appliances Cisco has released …
Week in review: Digital signature spoofing, securing microservices
Here’s an overview of some of last week’s most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, …
Week in review: Zip Slip, GDPR and the US, why creativity is key to security
Here’s an overview of some of last week’s most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos …