Week in review

Week in review: FaceTime bug, Apple developer certs abused, new privacy attack against 5G
Here’s an overview of some of last week’s most interesting news and articles: New Mac malware steals cookies, cryptocurrency and computing power A new piece of Mac …

Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience
Here’s an overview of some of last week’s most interesting news and articles: Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution A …

Week in review: SD-WAN deployment, security DevOps, a new taxonomy for SCADA attacks
Here’s an overview of some of last week’s most interesting news and articles: Compromised ad company serves Magecart skimming code to hundreds of websites The …

Week in review: How data becomes intelligence, email security predictions, EU bug bounties
Here’s an overview of some of last week’s most interesting news and articles: The attack surface is growing faster than it has at any other point in the history of …
Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting
Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role …

Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Old and new OpenSSH backdoors threaten Linux servers OpenSSH, a suite of networking …

Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai
Here’s an overview of some of last week’s most interesting news and articles: The fundamentals of network security and cybersecurity hygiene The two fundamental …

Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery
Here’s an overview of some of last week’s most interesting news and articles: Don’t accept risk with a pocket veto No security professional wants to accept risk. …

Week in review: Vaporworms, DevOps roadmap for security, ethical data management
Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of …

Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs
Here’s an overview of some of last week’s most interesting news and articles: Five key considerations when developing a Security Operations Center Organizations …

Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack
Here’s an overview of some of last week’s most interesting news and articles: New techniques expose your browsing history to attackers Security researchers at UC …

Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend
Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create …
Featured news
Resources
Don't miss
- Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)
- Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)
- How to get better results from bug bounty programs without wasting money
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)