Week in review

Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps
Here’s an overview of some of last week’s most interesting news: How to allocate budget for a well-rounded cybersecurity portfolio What should a well-rounded …

Week in review: New LTE attacks, common API vulnerabilities, risk management trends
Here’s an overview of some of last week’s most interesting news: Four common API vulnerabilities and how to prevent them One of the main purposes of an API is to …

Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3
Here’s an overview of some of last week’s most interesting news and articles: How Facebook and Google nudge users to make anti-privacy choices Facebook, Google and …

Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Cisco plugs critical flaws in many switches, security appliances Cisco has released …

Week in review: Digital signature spoofing, securing microservices
Here’s an overview of some of last week’s most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, …

Week in review: Zip Slip, GDPR and the US, why creativity is key to security
Here’s an overview of some of last week’s most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos …

Week in review: How GDPR affects WHOIS, and what CISOs can learn from Tyrion
Here’s an overview of some of last week’s most interesting news and articles: CIOs are forced to compromise between faster innovation and perfectly working …

Week in review: VPNFilter, hacking BMW cars, verifying data processing for privacy and GDPR
Here’s an overview of some of last week’s most interesting news and articles: The percentage of open source code in proprietary apps is rising The number of open …

Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches
Here’s an overview of some of last week’s most interesting news, podcasts and articles: How can Office 365 phishing threats be addressed? The frequency of phishing …

Week in review: ATM attacks, security automation, hacking for fun and profit
Here’s an overview of some of last week’s most interesting news and articles: iOS users are 18x more likely to be phished than to download malware Phishing is the …

Week in review: New Cybersecurity Framework, Android patching issues, RSA Conference 2018
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2018 coverage Check out what you missed at the infosec event of the …

Week in review: Emergency alert systems easily hacked, the cost of GDPR compliance
Here’s an overview of some of last week’s most interesting news and articles: One in 10 C-level execs say GDPR will cost them over $1 million Companies are taking …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?