- Fake job offers target software developers with infostealerson February 20, 2025 at 2:11 pm
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers
- DeceptiveDevelopment targets freelance developerson February 20, 2025 at 10:00 am
ESET researchers analyzed a campaign delivering malware bundled with job interview challenges
- No, you’re not fired – but beware of job termination scamson February 18, 2025 at 10:00 am
Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff
- Katharine Hayhoe: The most important climate equation | Starmus highlightson February 17, 2025 at 10:00 am
The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action
- Gaming or gambling? Lifting the lid on in-game loot boxeson February 13, 2025 at 10:00 am
The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down
- What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)on February 12, 2025 at 10:00 am
Ever wondered what it's like to hack for a living – legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.
- How AI-driven identify fraud is causing havocon February 11, 2025 at 10:00 am
Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back
- Neil Lawrence: What makes us unique in the age of AI | Starmus highlightson February 10, 2025 at 10:00 am
As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?
- Patch or perish: How organizations can master vulnerability managementon February 5, 2025 at 10:00 am
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
- Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlightson February 4, 2025 at 1:39 pm
Left unchecked, AI's energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry without sacrificing performance?
- How scammers are exploiting DeepSeek's riseon January 31, 2025 at 1:51 pm
As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek
- This month in security with Tony Anscombe – January 2025 editionon January 30, 2025 at 11:32 am
DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy
- Untrustworthy AI: How to deal with data poisoningon January 30, 2025 at 10:00 am
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so
- Brian Greene: Until the end of time | Starmus highlightson January 29, 2025 at 8:38 am
The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity
- Going (for) broke: 6 common online betting scams and how to avoid themon January 28, 2025 at 10:00 am
Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly set by scammers
- The evolving landscape of data privacy: Key trends to shape 2025on January 23, 2025 at 10:00 am
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
- PlushDaemon compromises supply chain of Korean VPN serviceon January 22, 2025 at 6:00 am
ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon
- Under lock and key: Protecting corporate data from cyberthreats in 2025on January 21, 2025 at 10:00 am
Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage
- UEFI Secure Boot: Not so secureon January 16, 2025 at 3:40 pm
ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems
- Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344on January 16, 2025 at 10:00 am
The story of a signed UEFI application allowing a UEFI Secure Boot bypass