Week in review

Week in review: DNS DDoS, Linux kernel zero-day, VeraCrypt audited
Here’s an overview of some of last week’s most interesting news, reviews and articles: Dirty COW Linux kernel zero-day exploited in the wild is now patched Linux …

Week in review: Social media surveillance, ransomware recovery, US accuses Russia of hacking
Here’s an overview of some of last week’s most interesting news, reviews and articles: Twitter, Facebook revoke access to social media surveillance software used …

Week in review: Security fatigue, open source jobs, and compromised online shops
Here’s an overview of some of last week’s most interesting news and articles: 100+ online shops compromised with payment data-stealing code Since March 2016 (and …

Week in review: Securing ICS, and the reasons behind risky password practices
Here’s an overview of some of last week’s most interesting news and articles: Yahoo breach was not state-sponsored, researchers claim The massive 2014 Yahoo breach …

Week in review: Yahoo breach, Tesla remote hijack, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news, reviews and articles: Repercussions of the massive Yahoo breach Yahoo has announced on Thursday …

Week in review: MySQL 0-day, Stingrays, and the end of Patch Tuesday
Here’s an overview of some of last week’s most interesting news and articles: Five ways to respond to the ransomware threat While organizations wrestle with the …

Week in review: Stealing login credentials, secure mobile communications explained
Here’s an overview of some of last week’s most interesting news, reviews, podcasts and articles: Rambler.ru hack: Passwords of nearly 100 million users exposed A …

Week in review: USBee, DNSSEC abuse, and IoT security research
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Linux servers hit with FairWare ransomware – or is it just a scam? Victims …

Week in review: iOS zero-days exploited, hacking cellphone towers and brain implants
Here’s an overview of some of last week’s most interesting news, reviews and articles: Backdoor uses TeamViewer to spy on victims A backdoor Trojan with spying …

Week in review: Hacking smart cities, leaked hacking tools, and detecting hardware Trojans
Here’s an overview of some of last week’s most interesting news and articles: eBook: Defending against crypto ransomware Download your copy of the Defending …

Week in review: Spoofing boarding pass QR codes, blocking USB-based threats
Here’s an overview of some of last week’s most interesting news, reviews and articles: Malware hidden in digitally signed executables can bypass AV protection …

Week in review: Black Hat USA 2016 coverage, QRLJacking, exposed SAP systems
Here’s an overview of some of last week’s most interesting news and articles: Black Hat USA 2016 Want to learn the news from Black Hat USA 2016? Get is all from …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)