Week in review
Week in review: 5 popular cybersecurity exploitation techniques, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 69 released (IN)SECURE Magazine is a free …
Week in review: How to improve your AD security posture, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: July 2021 Patch Tuesday forecast: Don’t wait for Patch Tuesday There’s been lots of …
Week in review: PoC for Windows Print Spooler flaw leaked, conquering synthetic identity fraud
Here’s an overview of some of last week’s most interesting news and articles: PoC for critical Windows Print Spooler flaw leaked Microsoft has confirmed that the …
Week in review: Preventing ransomware attacks, SOC burnout, and customizing your ATT&CK database
Here’s an overview of some of last week’s most interesting news and articles: Vulnerabilities in Dell computers allow RCE at the BIOS/UEFI level An estimated 30 …
Week in review: VPN attacks up nearly 2000%, Root of Trust for the cloud era
Here’s an overview of some of last week’s most interesting news and articles: Unprotected CVS database exposed sensitive customer searches Researchers have …
Week in review: Kali Linux 2021.2, the human cost of understaffed SOCs, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2021.2 released: Kaboxer, Kali-Tweaks, new tools, and more! Offensive …
Week in review: VMware critical updates, prevalent enterprise cybersecurity risks, 3 years of GDPR
Here’s an overview of some of last week’s most interesting news and articles: Belgium’s Interior Ministry uncovers 2-year-long compromise of its network Belgium’s Federal …
Week in review: Dealing with ransomware attacks, detecting use of stolen API credentials inside AWS
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Vulnerability in popular browsers could be used to track, profile users online A …
Week in review: Top security threats for power plants, defending against Windows RDP attacks
Here’s an overview of some of last week’s most interesting news and articles: Why threat hunting is obsolete without context Threat hunting is one of the more recent …
Week in review: Patch Tuesday forecast, how to select a DLP solution, is it OK to publish PoC exploits?
Here’s an overview of some of last week’s most interesting news, articles and interviews: 21 vulnerabilities found in Exim, update your instances ASAP! A code audit of Exim, a …
Week in review: QNAP NAS ransomware, threat modeling, the realities of working in cybersecurity
Here’s an overview of some of last week’s most interesting news, articles and interviews: Attackers can teach you to defend your organization against phishing Using the kill …
Week in review: Pulse Secure zero-day actively exploited, how to select an IAM solution
Here’s an overview of some of last week’s most interesting news, articles and interviews: Infosecurity transformation and building proactive mitigation strategies In this …
Featured news
Resources
Don't miss
- Security work keeps expanding, even with AI in the mix
- Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- Google disrupts proxy network used by 550+ threat groups
- eScan AV users targeted with malicious updates
- Google agrees to pay $135 million over Android data harvesting claims