Week in review

Week in review: How data becomes intelligence, email security predictions, EU bug bounties
Here’s an overview of some of last week’s most interesting news and articles: The attack surface is growing faster than it has at any other point in the history of …
Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting
Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role …

Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Old and new OpenSSH backdoors threaten Linux servers OpenSSH, a suite of networking …

Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai
Here’s an overview of some of last week’s most interesting news and articles: The fundamentals of network security and cybersecurity hygiene The two fundamental …

Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery
Here’s an overview of some of last week’s most interesting news and articles: Don’t accept risk with a pocket veto No security professional wants to accept risk. …

Week in review: Vaporworms, DevOps roadmap for security, ethical data management
Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of …

Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs
Here’s an overview of some of last week’s most interesting news and articles: Five key considerations when developing a Security Operations Center Organizations …

Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack
Here’s an overview of some of last week’s most interesting news and articles: New techniques expose your browsing history to attackers Security researchers at UC …

Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend
Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create …

Week in review: Pentagon data breach, cybersecurity workforce gap, who gets spear phished?
Here’s an overview of some of last week’s most interesting news and articles: Who gets spear phished, and why? Spear phishing is one of the most successful methods …

Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free
Here’s an overview of some of last week’s most interesting news and articles: Researchers link Industroyer to NotPetya ESET researchers believe they have found …

Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors
Here’s an overview of some of last week’s most interesting news and articles: APTs are targeting IT service providers Managed service providers (MSPs) and cloud …
Featured news
Resources
Don't miss
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft
- Forward-thinking CISOs are shining a light on shadow IT
- Inside the AI-driven threat landscape
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)