Week in review
Week in review: Digital signature spoofing, securing microservices
Here’s an overview of some of last week’s most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, …
Week in review: Zip Slip, GDPR and the US, why creativity is key to security
Here’s an overview of some of last week’s most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos …
Week in review: How GDPR affects WHOIS, and what CISOs can learn from Tyrion
Here’s an overview of some of last week’s most interesting news and articles: CIOs are forced to compromise between faster innovation and perfectly working …
Week in review: VPNFilter, hacking BMW cars, verifying data processing for privacy and GDPR
Here’s an overview of some of last week’s most interesting news and articles: The percentage of open source code in proprietary apps is rising The number of open …
Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches
Here’s an overview of some of last week’s most interesting news, podcasts and articles: How can Office 365 phishing threats be addressed? The frequency of phishing …
Week in review: ATM attacks, security automation, hacking for fun and profit
Here’s an overview of some of last week’s most interesting news and articles: iOS users are 18x more likely to be phished than to download malware Phishing is the …
Week in review: New Cybersecurity Framework, Android patching issues, RSA Conference 2018
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2018 coverage Check out what you missed at the infosec event of the …
Week in review: Emergency alert systems easily hacked, the cost of GDPR compliance
Here’s an overview of some of last week’s most interesting news and articles: One in 10 C-level execs say GDPR will cost them over $1 million Companies are taking …
Week in review: Critical flaw in Cisco switches, Saks breach, closing the security update gap
Here’s an overview of some of last week’s most interesting news and articles: Establishing covert communication channels by abusing GSM AT commands Security …
Week in review: Hacking intelligent buildings, trust in critical systems under attack
Here’s an overview of some of last week’s most interesting news and articles: The current state of USB data protection The vast majority of employees rely on USB …
Week in review: PKI and IoT, Facebook’s trust crisis, understanding email fraud
Here’s an overview of some of last week’s most interesting news and articles: Top cybersecurity evasion and exfiltration techniques used by attackers SS8 released …
Week in review: Big data and insurance, wireless standards hackers will target after Wi-Fi
Here’s an overview of some of last week’s most interesting news and articles: Malicious activity surges coincide with geopolitical events 2017 was a year of …
Featured news
Resources
Don't miss
- Is your password manager truly GDPR compliant?
- 7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)
- Exam prep hacked: Study tips and tricks that really work
- Stealth-patched FortiWeb vulnerability under active exploitation (CVE-2025-58034)
- Threat group reroutes software updates through hacked network gear