Latest Articles

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data

Christian Ali Bravo05 Nov 2025


How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead

Editor04 Nov 2025


Ground zero: 5 things to do after discovering a cyberattack

Ground zero: 5 things to do after discovering a cyberattack

Ground zero: 5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between disruption and disaster

Phil Muncaster03 Nov 2025


This month in security with Tony Anscombe – October 2025 edition

This month in security with Tony Anscombe – October 2025 edition

This month in security with Tony Anscombe – October 2025 edition

From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now

Editor31 Oct 2025


Fraud prevention: How to help older family members avoid scams

Fraud prevention: How to help older family members avoid scams

Fraud prevention: How to help older family members avoid scams

Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically

Editor30 Oct 2025


Cybersecurity Awareness Month 2025: When seeing isn't believing

Cybersecurity Awareness Month 2025: When seeing isn't believing

Cybersecurity Awareness Month 2025: When seeing isn't believing

Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams

Editor29 Oct 2025


Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Recruitment red flags: Can you spot a spy posing as a job seeker?

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms

Phil Muncaster28 Oct 2025


How MDR can give MSPs the edge in a competitive market

How MDR can give MSPs the edge in a competitive market

How MDR can give MSPs the edge in a competitive market

With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs

Phil Muncaster27 Oct 2025


Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures

Editor24 Oct 2025


Gotta fly: Lazarus targets the UAV sector

Gotta fly: Lazarus targets the UAV sector

Gotta fly: Lazarus targets the UAV sector

ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group

Peter Kálnai and Alexis Rapin23 Oct 2025


SnakeStealer: How it preys on personal data – and how you can protect yourself

SnakeStealer: How it preys on personal data – and how you can protect yourself

SnakeStealer: How it preys on personal data – and how you can protect yourself

Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts

Martina López22 Oct 2025


Cybersecurity Awareness Month 2025: Building resilience against ransomware

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?

Editor20 Oct 2025


Apt Activity Report
MDR Protection