Week in review
Week in review: Amazon scammers hijack seller accounts, Shadow Brokers say goodbye
Here’s an overview of some of last week’s most interesting news and articles: Employee burnout: The biggest workplace challenge in 2017 A new study by Kronos and …
Week in review: Yahoo breach, malvertising targeting routers, the economics of ransomware
Here’s an overview of some of last week’s most interesting news and articles: Malvertising campaign compromises routers instead of computers The attackers current …
Week in review: OpenVPN audit, cybersecurity gamification, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The global decline of cybersecurity confidence According to this …
Week in review: Sextortion, Firefox 0-day, and next level red teaming
Here’s an overview of some of last week’s most interesting news, podcasts and articles: McAfee Labs predicts 14 security developments for 2017 Ransomware attacks …
Week in review: Locky spreading via Facebook, principles for efficient cyber investigations
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Cobalt hackers executed massive, synchronized ATM heists across Europe, …
Week in review: PoisonTap compromises locked computers, how hackers will exploit IoT in 2017
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Researchers reveal WiFi-based mobile password discovery attack A …
Week in review: Tesco Bank breach, and a checklist for people who understand cyber security
Here’s an overview of some of last week’s most interesting news and articles: Bug in Chrome for mobile exploited for drive-by Android malware downloads Users of …
Week in review: Actively exploited Windows 0-day, ICS and IoT security
Here’s an overview of some of last week’s most interesting news, podcasts and articles: 65% of Windows devices still running Windows 7, released in 2009 To analyze …
Week in review: IoT, Windows code injection, new user privacy rules for ISPs
Here’s an overview of some of last week’s most interesting news, reviews and articles: New code injection attack works on all Windows versions Researchers from …
Week in review: DNS DDoS, Linux kernel zero-day, VeraCrypt audited
Here’s an overview of some of last week’s most interesting news, reviews and articles: Dirty COW Linux kernel zero-day exploited in the wild is now patched Linux …
Week in review: Social media surveillance, ransomware recovery, US accuses Russia of hacking
Here’s an overview of some of last week’s most interesting news, reviews and articles: Twitter, Facebook revoke access to social media surveillance software used …
Week in review: Security fatigue, open source jobs, and compromised online shops
Here’s an overview of some of last week’s most interesting news and articles: 100+ online shops compromised with payment data-stealing code Since March 2016 (and …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring