Week in review

Week in review: Hacking through subtitles, new class of attacks against Android
Here’s an overview of some of last week’s most interesting news and articles: How to build a better SOC team There’s no scarcity of discussion around the reasons …

Week in review: WannaCry decryptor available, stealing Windows credentials using Google Chrome
Here’s an overview of some of last week’s most interesting news and articles: DocuSign breached, stolen info used for targeted phishing campaign Phishing emails …

Week in review: WannaCry disaster, SharePoint security, the importance of security culture
Here’s an overview of some of last week’s most interesting news and articles: Massive ransomware campaign spreading around the world like wildfire Organizations …

Week in review: Hacking industrial robots, criminals exploit SS7 flaws to empty bank accounts
Here’s an overview of some of last week’s most interesting news and articles: Three cybersecurity threat trends that organizations should address today The …

Week in review: Lure10 attack, DoublePulsar exploit proliferation
Here’s an overview of some of last week’s most interesting news and articles: BrickerBot bricked 2 million IoT devices, its author claims The author of BrickerBot, …

Week in review: Open source security threats, secure C++ coding
Here’s an overview of some of last week’s most interesting news and articles: Will blockchain liability be similar to Bitcoin liability? Blockchain can be used for …
Week in review: Leaked Windows exploits, mobile payment card cloning
Here’s an overview of some of last week’s most interesting news and articles: Microsoft patched the flaws allowing leaked Windows exploits to work Microsoft has …

Week in review: Highest paying IT certifications, emergency iOS patch, and how attackers exploit whitelists
Here’s an overview of some of last week’s most interesting news and articles: Windows 10 Creators Update will come with clearer privacy options Nearly two years …

Week in review: IIS zero-day, iOS scareware, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Like it or not, “cyber” is a shorthand for all things infosec We have lost the cyber …

Week in review: Leaking LastPass extensions, 300+ hackable Cisco switches
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Malware posing as Siemens PLC software is hitting industrial environments …

Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Vulnerability in WhatsApp and Telegram allowed complete account takeover …

Week in review: Apache servers under attack, machine leaning in infosec
Here’s an overview of some of last week’s most interesting news, podcasts and articles: The six stages of a cyber attack lifecycle High-impact cyber incidents can …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility