Week in review

Week in review: MySQL databases held for ransom, CloudPets as surveillance devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Google releases details, PoC exploit code for IE, Edge flaw As we’re …

Week in review: Mac ransomware, women in infosec, and the death of SHA-1
Here’s an overview of some of last week’s most interesting news, articles and podcasts: The dangers that come with buying pre-owned IoT devices When you buy a …

Week in review: Self-healing malware, Patch Tuesday postponed, RSA Conference 2017
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2017 coverage Check out what you missed at the infosec event of the …

Week in review: Fileless malware, HTTPS interception in the wild, simple Gmail spoofing
Here’s an overview of some of last week’s most interesting news, reviews and articles: Banks around the world hit with fileless malware Kaspersky Lab researchers …

Week in review: Windows DoS zero-day, uncloaking Tor Browser users
Here’s an overview of some of last week’s most interesting news and articles: Half of IT pros don’t know how to improve their security posture Mid-market …

Week in review: Kali Linux certification, cross-browser fingerprinting, most common passwords of 2016
Here’s an overview of some of last week’s most interesting news and articles: Fruitfly: Unusual Mac backdoor used for tightly targeted attacks? The malware – …

Week in review: Amazon scammers hijack seller accounts, Shadow Brokers say goodbye
Here’s an overview of some of last week’s most interesting news and articles: Employee burnout: The biggest workplace challenge in 2017 A new study by Kronos and …

Week in review: Yahoo breach, malvertising targeting routers, the economics of ransomware
Here’s an overview of some of last week’s most interesting news and articles: Malvertising campaign compromises routers instead of computers The attackers current …

Week in review: OpenVPN audit, cybersecurity gamification, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The global decline of cybersecurity confidence According to this …

Week in review: Sextortion, Firefox 0-day, and next level red teaming
Here’s an overview of some of last week’s most interesting news, podcasts and articles: McAfee Labs predicts 14 security developments for 2017 Ransomware attacks …

Week in review: Locky spreading via Facebook, principles for efficient cyber investigations
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Cobalt hackers executed massive, synchronized ATM heists across Europe, …

Week in review: PoisonTap compromises locked computers, how hackers will exploit IoT in 2017
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Researchers reveal WiFi-based mobile password discovery attack A …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility