Week in review

Week in review: New Cybersecurity Framework, Android patching issues, RSA Conference 2018
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2018 coverage Check out what you missed at the infosec event of the …

Week in review: Emergency alert systems easily hacked, the cost of GDPR compliance
Here’s an overview of some of last week’s most interesting news and articles: One in 10 C-level execs say GDPR will cost them over $1 million Companies are taking …

Week in review: Critical flaw in Cisco switches, Saks breach, closing the security update gap
Here’s an overview of some of last week’s most interesting news and articles: Establishing covert communication channels by abusing GSM AT commands Security …

Week in review: Hacking intelligent buildings, trust in critical systems under attack
Here’s an overview of some of last week’s most interesting news and articles: The current state of USB data protection The vast majority of employees rely on USB …

Week in review: PKI and IoT, Facebook’s trust crisis, understanding email fraud
Here’s an overview of some of last week’s most interesting news and articles: Top cybersecurity evasion and exfiltration techniques used by attackers SS8 released …

Week in review: Big data and insurance, wireless standards hackers will target after Wi-Fi
Here’s an overview of some of last week’s most interesting news and articles: Malicious activity surges coincide with geopolitical events 2017 was a year of …

Week in review: New LTE attacks, Android P security, backdooring connected cars
Here’s an overview of some of last week’s most interesting news and articles: How to improve your security infrastructure when you’re on a budget You may not be …

Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Automating out of the skill gap sinkhole When thinking about the bigger picture, …

Week in review: Hidden cybersecurity talent, the myths hampering cybersecurity maturity
Here’s an overview of some of last week’s most interesting news and articles: Counterfeit digital certificates for sale on underground forums Researchers have …

Week in review: Vulnerability tracking, GDPR quick guide, tackling the insider threat
Here’s an overview of some of last week’s most interesting news and articles: Intel offers to pay for Spectre-like side channel vulnerabilities Intel is expanding …

Week in review: Crypto-mining malware hits SCADA network, server-side exploits dominate threat landscape
Here’s an overview of some of last week’s most interesting news and articles: When crypto-mining malware hits a SCADA network Radiflow has recently discovered …

Week in review: The future of smartphone security, automated cyber threat anticipation
Here’s an overview of some of last week’s most interesting news and articles: Authentication today: Moving beyond passwords A new global study from IBM Security …
Featured news
Resources
Don't miss
- Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)
- Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)
- How to get better results from bug bounty programs without wasting money
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)