Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience

Here’s an overview of some of last week’s most interesting news and articles: Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution A vulnerability in the firmware of a Wi-Fi chipset that is widely used in laptops, … Continue reading Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience

Week in review: SD-WAN deployment, security DevOps, a new taxonomy for SCADA attacks

Here’s an overview of some of last week’s most interesting news and articles: Compromised ad company serves Magecart skimming code to hundreds of websites The attackers managed to compromise Adverline, a French online advertising company wi… Continue reading Week in review: SD-WAN deployment, security DevOps, a new taxonomy for SCADA attacks

Week in review: How data becomes intelligence, email security predictions, EU bug bounties

Here’s an overview of some of last week’s most interesting news and articles: The attack surface is growing faster than it has at any other point in the history of technology Avast launched its annual Threat Landscape Report, detailing the … Continue reading Week in review: How data becomes intelligence, email security predictions, EU bug bounties

Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting

Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role that authenticity plays in the establishment of deception as a practical def… Continue reading Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting

Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Old and new OpenSSH backdoors threaten Linux servers OpenSSH, a suite of networking software that allows secure communications over an unsecured network, is the m… Continue reading Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE

Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai

Here’s an overview of some of last week’s most interesting news and articles: The fundamentals of network security and cybersecurity hygiene The two fundamental building blocks to ensuring that your data is secure are physical infrastructur… Continue reading Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai

Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery

Here’s an overview of some of last week’s most interesting news and articles: Don’t accept risk with a pocket veto No security professional wants to accept risk. If we had our way, the organization would mitigate or avoid all risks. But tha… Continue reading Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery

Week in review: Vaporworms, DevOps roadmap for security, ethical data management

Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of research at Obsidian Security and a sociologist with an interest in the socia… Continue reading Week in review: Vaporworms, DevOps roadmap for security, ethical data management

Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs

Here’s an overview of some of last week’s most interesting news and articles: Five key considerations when developing a Security Operations Center Organizations should start with the following five key considerations if they are to get the … Continue reading Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs

Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack

Here’s an overview of some of last week’s most interesting news and articles: New techniques expose your browsing history to attackers Security researchers at UC San Diego and Stanford have discovered four new ways to expose Internet users’… Continue reading Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack