Week in review

Week in review: Hidden cybersecurity talent, the myths hampering cybersecurity maturity
Here’s an overview of some of last week’s most interesting news and articles: Counterfeit digital certificates for sale on underground forums Researchers have …

Week in review: Vulnerability tracking, GDPR quick guide, tackling the insider threat
Here’s an overview of some of last week’s most interesting news and articles: Intel offers to pay for Spectre-like side channel vulnerabilities Intel is expanding …

Week in review: Crypto-mining malware hits SCADA network, server-side exploits dominate threat landscape
Here’s an overview of some of last week’s most interesting news and articles: When crypto-mining malware hits a SCADA network Radiflow has recently discovered …

Week in review: The future of smartphone security, automated cyber threat anticipation
Here’s an overview of some of last week’s most interesting news and articles: Authentication today: Moving beyond passwords A new global study from IBM Security …

Week in review: Intel testing new Spectre fixes, ICO protection, cybercrooks abusing travel industry
Here’s an overview of some of last week’s most interesting news, articles, and whitepapers: British teenager hacked top ranking US officials using social …

Week in review: DoS attacks against hard disk, ethical hacking, and the rise of ransom hacks
Here’s an overview of some of last week’s most interesting news and articles: Norwegian health authority hacked, patient data of nearly 3 million citizens possibly …

Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection
Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs …

Week in review: Meltdown, Spectre, online tracking, and cryptojacking
Here’s an overview of some of last week’s most interesting news and articles: Meltdown and Spectre: Data theft hardware bugs affect most modern CPUs A design flaw …

Week in review: Keylogger in HP laptops, ICS-tailored malware, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a …

Week in review: Ransomware’s next stop, NiceHash hack, and why phishers love HTTPS
Here’s an overview of some of last week’s most interesting news and articles: Bitcoin traders beware: Fake trading bot offer delivers RAT The malicious offer comes …

Week in review: DevOps security, macOS root password bug, and the evil of vanity metrics
Here’s an overview of some of last week’s most interesting news and articles: Stealthy in-browser cryptomining continues even after you close window Hackers are …

Week in review: Risk assessment, fileless attacks, and the most hackable holiday gifts
Here’s an overview of some of last week’s most interesting news and articles: Review: EU GDPR Documentation Toolkit The General Data Protection Regulation (GDPR) …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility