Week in review: New Nmap, lateral phishing tactics, Kubernetes security matures

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Critical Bluetooth flaw opens millions of devices to eavesdropping attacks A newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can b… Continue reading Week in review: New Nmap, lateral phishing tactics, Kubernetes security matures

Week in review: SWAPGS attack, DNS security, vulnerable Siemens PLCs, Black Hat USA 2019

Here’s an overview of some of last week’s most interesting news, interviews and articles: Embracing the cloud and meeting its security demands You might expect that the largest companies are the most organized and mature when it comes to se… Continue reading Week in review: SWAPGS attack, DNS security, vulnerable Siemens PLCs, Black Hat USA 2019

Week in review: Capital One breach, Visa payment limit bypass flaw, VxWorks RTOS vulnerabilities

Here’s an overview of some of last week’s most interesting news, interviews and articles: The dynamic of modern security challenges: Issues security leaders face today We sat down with Neil Weicher, CTO & Founder, NetLib Security, to d… Continue reading Week in review: Capital One breach, Visa payment limit bypass flaw, VxWorks RTOS vulnerabilities

Week in review: Crafty Office 365 phishing, how DNS firewalls can burn security teams

Here’s an overview of some of last week’s most interesting news and articles: Phishers targeting Office 365 admins have a new trick up their sleeve Phishers targeting Office 365 admins have a new trick up their sleeve: they are checking the… Continue reading Week in review: Crafty Office 365 phishing, how DNS firewalls can burn security teams

Week in review: Malicious Python packages, FaceApp panic, and how to avoid a biometric dystopia

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Do you have what it takes to be a hardware hacker? If you ask Yago Hansen, a hacker specialized in Wi-Fi and RF security, curiosity and a willingness to learn and i… Continue reading Week in review: Malicious Python packages, FaceApp panic, and how to avoid a biometric dystopia

Week in review: Fileless malware, usable cybersecurity, Magecart goes after S3 buckets

Here’s an overview of some of last week’s most interesting news and articles: Inside the NIST team working to make cybersecurity more user-friendly Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to … Continue reading Week in review: Fileless malware, usable cybersecurity, Magecart goes after S3 buckets

Week in review: The art and science of password hashing, cybersecurity crisis comms

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Bringing more talented individuals into the security industry In this interview, Tony Vizza, Director of Cybersecurity Advocacy, Asia-Pacific, (ISC)2, talks about t… Continue reading Week in review: The art and science of password hashing, cybersecurity crisis comms

Week in review: Vaccinating algorithms against attacks, cybersecurity pros burning out

Here’s an overview of some of last week’s most interesting news, articles and reviews: Anatomy of a ransomware attack: How attackers gain access to unstructured data Ransomware isn’t a new phenomenon, but it’s effects are starting to be fel… Continue reading Week in review: Vaccinating algorithms against attacks, cybersecurity pros burning out

Week in review: Kali Linux roadmap, runtime container security, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks Tesla Model S and Model 3 electric cars are vulnerable to cyberattacks aimed at thei… Continue reading Week in review: Kali Linux roadmap, runtime container security, new issue of (IN)SECURE