Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide
Published on: July 31, 2024 | Source:ESET researchers detected multiple, widespread phishing campaigns targeting SMBs in Poland during May 2024, distributing various malware families
Published on: July 30, 2024 | Source:Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants
Published on: July 29, 2024 | Source:Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files
Published on: July 26, 2024 | Source:Organizations, including those that werenβt struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances
Published on: July 23, 2024 | Source:ESET researchers have discovered threats abusing the success of the Hamster Kombat clicker game
Published on: July 23, 2024 | Source:ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos
Published on: July 22, 2024 | Source:A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats
Published on: July 21, 2024 | Source:The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Hereβs why you shouldnβt dread them.
Published on: July 19, 2024 | Source:If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike
Published on: July 19, 2024 | Source:A study of a sophisticated Chinese browser injector that leaves more doors open!
Published on: July 18, 2024 | Source:These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity
Published on: July 16, 2024 | Source:Your humble phone number is more valuable than you may think. Hereβs how it could fall into the wrong hands β and how you can help keep it out of the reach of fraudsters.
Published on: July 15, 2024 | Source:Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective?
Published on: July 12, 2024 | Source:As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?
Published on: July 10, 2024 | Source:Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account
Published on: July 09, 2024 | Source:Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?
Published on: July 04, 2024 | Source:From sending phishing emails to posting fake listings, hereβs how fraudsters hunt for victims while youβre booking your well-earned vacation
Published on: July 03, 2024 | Source:While AI can liberate us from tedious tasks and even eliminate human error, it's crucial to remember its weaknesses and the unique capabilities that humans bring to the table
Published on: July 02, 2024 | Source:Hereβs how cybercriminals go after YouTube channels and use them as conduits for fraud β and what you should watch out for when watching videos on the platform
Published on: July 01, 2024 | Source:Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year
Published on: June 28, 2024 | Source:A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Published on: June 27, 2024 | Source:Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies
Published on: June 26, 2024 | Source:VPNs are not all created equal β make sure to choose the right provider that will help keep your data safe from prying eyes
Published on: June 25, 2024 | Source:Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents
Published on: June 21, 2024 | Source:As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records
Published on: June 20, 2024 | Source:Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat
Published on: June 19, 2024 | Source:Donβt get hacked in the first place β it costs far less than dealing with the aftermath of a successful attack
Published on: June 17, 2024 | Source:The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app
Published on: June 14, 2024 | Source:The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023
Published on: June 14, 2024 | Source:ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine
Published on: June 13, 2024 | Source:The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!
Published on: June 10, 2024 | Source:Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data
Published on: June 07, 2024 | Source:$90,000/year, full home office, and 30 days of paid leave for a junior data analyst β what's not to like? Except that these kinds of job offers are only intended to trick unsuspecting victims into giving up their data.
Published on: June 06, 2024 | Source:Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky β unless you know where to look
Published on: June 03, 2024 | Source: