Week in review: Social media-enabled cybercrime, fighting credential stuffing, digital signature spoofing

Here’s an overview of some of last week’s most interesting news and articles: How WebAuthn aims to solve the password problem Rather than tasking users with tracking dozens of separate passwords or requiring them to perform increasingly ela… Continue reading Week in review: Social media-enabled cybercrime, fighting credential stuffing, digital signature spoofing

Week in review: Formjacking, flawed password managers, phishers’ new trick

Here’s an overview of some of last week’s most interesting news and articles: IT security incidents affecting German critical infrastructure are on the rise In 2017, the German Federal Office for Security in Information Technology (BSI) rec… Continue reading Week in review: Formjacking, flawed password managers, phishers’ new trick

Week in review: RunC, Snapd flaws, Zero Trust browsing, 5 years of NIST Cybersecurity Framework

Here’s an overview of some of last week’s most interesting news and articles: Machine learning fundamentals: What cybersecurity professionals need to know In this Help Net Security podcast, Chris Morales, Head of Security Analytics at Vectr… Continue reading Week in review: RunC, Snapd flaws, Zero Trust browsing, 5 years of NIST Cybersecurity Framework

Week in review: Vaporworms, 8 months of GDPR, penetration testing effectiveness

Here’s an overview of some of last week’s most interesting news and articles: Why vaporworms might be the scourge of 2019 Not too long ago, the WatchGuard Threat Lab predicted the emergence of vaporworms as a major new cyber threat that wil… Continue reading Week in review: Vaporworms, 8 months of GDPR, penetration testing effectiveness

Week in review: FaceTime bug, Apple developer certs abused, new privacy attack against 5G

Here’s an overview of some of last week’s most interesting news and articles: New Mac malware steals cookies, cryptocurrency and computing power A new piece of Mac malware is looking to steal both the targets’ computing power and their cryp… Continue reading Week in review: FaceTime bug, Apple developer certs abused, new privacy attack against 5G

Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience

Here’s an overview of some of last week’s most interesting news and articles: Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution A vulnerability in the firmware of a Wi-Fi chipset that is widely used in laptops, … Continue reading Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience

Week in review: SD-WAN deployment, security DevOps, a new taxonomy for SCADA attacks

Here’s an overview of some of last week’s most interesting news and articles: Compromised ad company serves Magecart skimming code to hundreds of websites The attackers managed to compromise Adverline, a French online advertising company wi… Continue reading Week in review: SD-WAN deployment, security DevOps, a new taxonomy for SCADA attacks

Week in review: How data becomes intelligence, email security predictions, EU bug bounties

Here’s an overview of some of last week’s most interesting news and articles: The attack surface is growing faster than it has at any other point in the history of technology Avast launched its annual Threat Landscape Report, detailing the … Continue reading Week in review: How data becomes intelligence, email security predictions, EU bug bounties

Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting

Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role that authenticity plays in the establishment of deception as a practical def… Continue reading Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting

Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Old and new OpenSSH backdoors threaten Linux servers OpenSSH, a suite of networking software that allows secure communications over an unsecured network, is the m… Continue reading Week in review: CAPTCHA-breaking AI, Australian anti-encryption bill, new issue of (IN)SECURE