- Building cyber-resilience: Lessons learned from the CrowdStrike incidenton July 23, 2024 at 12:23 pm
Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances
- The tap-estry of threats targeting Hamster Kombat playerson July 23, 2024 at 9:00 am
ESET researchers have discovered threats abusing the success of the Hamster Kombat clicker game
- Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Androidon July 22, 2024 at 9:00 am
ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos
- How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombeon July 21, 2024 at 7:24 am
A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats
- Beyond the blue screen of death: Why software updates matteron July 19, 2024 at 4:20 pm
The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them.
- The complexities of cybersecurity update processeson July 19, 2024 at 12:28 pm
If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike
- HotPage: Story of a signed, vulnerable, ad-injecting driveron July 18, 2024 at 9:30 am
A study of a sophisticated Chinese browser injector that leaves more doors open!
- Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skillson July 16, 2024 at 9:30 am
These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity
- Hello, is it me you’re looking for? How scammers get your phone numberon July 15, 2024 at 11:45 am
Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters.
- Should ransomware payments be banned? – Week in security with Tony Anscombeon July 12, 2024 at 12:30 pm
Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective?
- Understanding IoT security risks and how to mitigate them | Cybersecurity podcaston July 10, 2024 at 9:30 am
As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?
- 5 common Ticketmaster scams: How fraudsters steal the showon July 9, 2024 at 9:30 am
Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account
- Social media and teen mental health – Week in security with Tony Anscombeon July 4, 2024 at 2:31 pm
Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?
- No room for error: Don’t get stung by these common Booking.com scamson July 3, 2024 at 9:30 am
From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation
- AI in the workplace: The good, the bad, and the algorithmicon July 2, 2024 at 9:30 am
While AI can liberate us from tedious tasks and even eliminate human error, it's crucial to remember its weaknesses and the unique capabilities that humans bring to the table
- Hijacked: How hacked YouTube channels spread scams and malwareon July 1, 2024 at 9:30 am
Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform
- Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombeon June 28, 2024 at 1:13 pm
Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year
- ESET Threat Report H1 2024on June 27, 2024 at 9:30 am
A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
- Cyber insurance as part of the cyber threat mitigation strategyon June 26, 2024 at 11:31 am
Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies
- Buying a VPN? Here’s what to know and look foron June 25, 2024 at 9:30 am
VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes