‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products
Search results for: "supply chain"
If we can’t secure the supply chain, eventually everything else will break
Striking the balance between supply, demand and safety is a major concern
Multimillion dollar movies and TV shows are increasingly being targeted by cybercriminals. ESET's Stephen Cobb investigates the cyber supply chain risk management problem and explains what to do about it.
Technology companies including Cisco and IBM are backing an Open Group programme to protect computer hardware from threats such as spyware added to components in the supply chain.
You spell it Huawei and say it wah-way and it’s all over the news. But what does it mean for the security of your data when, as the Wall Street Journal put it, “A U.S. Congressional report has labeled Chinese telecommunications company Huawei Technologies a national security threat”? As we will see, the implications for
As news breaks about the supply-chain ransomware attack against Kaseya's IT management software, here’s what we know so far
How can organizations tackle the growing menace of attacks that shake trust in software?
ESET researchers uncover a supply-chain attack used in a cyberespionage operation targeting online‑gaming communities in Asia
ESET researchers have uncovered a supply-chain attack on the website of a government in Southeast Asia.
ESET researchers uncover a novel Lazarus supply-chain attack leveraging WIZVERA VeraPort software
Latest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchange
Customers see their admin credentials stolen and their servers infected with Linux/ChachaDDoS
Our researchers noticed that the makers of the Elmedia Player software have been distributing a version of their app trojanized with the OSX/Proton malware.
This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.
What can municipalities do to better protect their water supply systems?
Nitol versus Michelangelo: the supply chain is much more than the production line.
How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice
As we close out another year like no other, let's look back at some of the most notable cybersecurity stories that shaped 2021
It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season