
Week in review: Zip Slip, GDPR and the US, why creativity is key to security
Here’s an overview of some of last week’s most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos …

Wi-Fi phishing attacks discovered around Atlanta City Hall
As Atlanta continues to fully recover from March’s ransomware attack, new evidence discovered today by Coronet reveals hundreds of active Wi-Fi phishing attacks …

Facebook confirms bug messed with 14 million users’ sharing settings
Facebook has admitted that, between May 18 and 27, posts by some 14 million users were automatically set to be shared with the public. “Every time you share something on …

Adobe releases fix for actively exploited Flash Player zero-day
If you’re still using Flash Player, it’s time to update it again – and quickly: Adobe has just patched a critical zero day vulnerability (CVE-2018-5002) …

New infosec products of the week: June 8, 2018
Symantec launches new features for the modern workforce Symantec announced new innovations and enhancements to its Network Security for the Cloud Generation solution, designed …

Cryptomining malware digs into nearly 40% of organizations worldwide
Check Point published its latest Global Threat Index for May 2018, revealing that the Coinhive cryptominer impacted 22% of organizations globally – up from 16% in April, an …

Businesses should embrace AI or face stagnation
If companies fail to make artificial intelligence (AI) a core competency within the next five years, they will face either stagnation or elimination. Recent GlobalData …

Traffic manipulation and cryptocurrency mining campaign compromised 40,000+ machines
Unknown attackers have compromised 40,000+ servers, networking and IoT devices around the world and are using them to mine Monero and redirect traffic to websites hosting tech …

Vulnerable ship systems: Many left exposed to hacking
Pen Test Partners’ Ken Munro and his colleagues – some of which are former ship crew members who really understand bridge and propulsion systems – have been …

Would you delete your account if a social media provider misused your data?
With the Facebook scandal involving Cambridge Analytica still fresh in people’s minds, two-thirds of professionals admit they would delete their account if a social media …

Five keys to secure DevOps, cloud and IoT adoption
90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI, according to BeyondTrust. Yet, while enterprises are …

Crowdsourced security trends: Payouts to hackers increase
Bugcrowd has released the 2018 Bugcrowd State of Bug Bounty Report, which analyzes proprietary platform data collected from more than 700 crowdsourced security programs …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised