Week in review: Windows crypto flaw, API security risks, exploits for Citrix security hole abound

Here’s an overview of some of last week’s most interesting news and articles: Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking A vulnerability (CVE-2019-19494) in Broadcom‘s cable modem firmware can open unknow… Continue reading Week in review: Windows crypto flaw, API security risks, exploits for Citrix security hole abound

Week in review: Citrix bug under attack, Windows 7 ransomware risk, ATT&CK for ICS

Here’s an overview of some of last week’s most interesting news and articles: Travelex extorted by ransomware gang, services still offline a week after the hit On the last day of 2019, foreign exchange company Travelex was hit by cyber atta… Continue reading Week in review: Citrix bug under attack, Windows 7 ransomware risk, ATT&CK for ICS

Week in review: Worst passwords of 2019, the end of Windows 7, 2020 cybersecurity trends

Here’s an overview of some of last week’s most interesting news and articles: Worst passwords of 2019: Are you using one of them? SplashData released their “Worst passwords of 2019” list, which includes the top 25 most dangerous and most co… Continue reading Week in review: Worst passwords of 2019, the end of Windows 7, 2020 cybersecurity trends

Week in review: 5G IoT security, efficient password cracking for pentesters, supply chain examination

Here’s an overview of some of last week’s most interesting news and articles: 5G IoT security: Opportunity comes with risks Slowly but surely, 5G digital cellular networks are being set up around the world. It will take years for widespread… Continue reading Week in review: 5G IoT security, efficient password cracking for pentesters, supply chain examination

Week in review: The data skills gap, new Kali Linux release, Apache Solr RCEs with public PoCs

Here’s an overview of some of last week’s most interesting news and articles: The overlooked part of an infosec strategy: Cyber insurance underwriting When a data breach or cyber attack hits the headlines one of the last things businesses a… Continue reading Week in review: The data skills gap, new Kali Linux release, Apache Solr RCEs with public PoCs

Week in review: Public cloud performance, new G Suite security options, how to build a successful SOC?

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Women in cybersecurity can benefit from taking inventory of their personal apps Just as new apps get replaced by old ones, we in the security profession… Continue reading Week in review: Public cloud performance, new G Suite security options, how to build a successful SOC?

Week in review: How to avoid lateral phishing, what’s the right time to red team?

Here’s an overview of some of last week’s most interesting news and articles: Your supplier’s BEC problem is your BEC problem BEC scammers don’t care what business the potential targets are in: all they care is that they have money that can… Continue reading Week in review: How to avoid lateral phishing, what’s the right time to red team?

Week in review: How to avoid lateral phishing, what’s the right time to red team?

Here’s an overview of some of last week’s most interesting news and articles: Your supplier’s BEC problem is your BEC problem BEC scammers don’t care what business the potential targets are in: all they care is that they have money that can… Continue reading Week in review: How to avoid lateral phishing, what’s the right time to red team?

Week in review: Active Directory security, Patch Tuesday forecast, stopping lateral phishing attacks

Here’s an overview of some of last week’s most interesting news, interviews and podcasts: How can security teams effectively monitor OT and ICS networks? Modern industrial operations are complex and dynamic environments that have unique sec… Continue reading Week in review: Active Directory security, Patch Tuesday forecast, stopping lateral phishing attacks