Remote access at risk: Pandemic pulls more cyber‑crooks into the brute‑forcing game
Poorly secured remote access attracts mostly ransomware gangs, but can provide access to coin miners and backdoors too
Education: Bc. in Journalism, Master's Degree in Political Science
Highlights of your career: Working for Slovak media for seven years, focusing on IT security, homeland security and defense matters. Managing media department at Bratislava-based security conferenceGLOBSEC.
Position and history at ESET: Joined ESET as a Security Specialist in September 2015. Fresh, new and eager to work.
What malware do you hate the most? The one my family downloads and I have to remove.
Favorite activities: Freeride snowboarding, meeting new people, reading and, as boring as it sounds, traveling.
Golden rule for cyberspace? Backup, update and never go on a clicking spree.
When did you get your first computer and what kind was it? I think it was in 1994 – 286 with MS-DOS preinstalled. There was no monitor available, so we could only use it when nobody was watching the TV.
Favorite computer game / activity: Classics such as Counter-Strike or the Call of Duty series. But what I do most on my computer is browse the web looking for interesting stuff.
Poorly secured remote access attracts mostly ransomware gangs, but can provide access to coin miners and backdoors too
Ondrej KubovičWhat you need to know about the critical security hole that could enable the next WannaCryptor
Ondrej KubovičAttack attempts involving the exploit are in hundreds of thousands daily
Ondrej KubovičEmotet starts another massive spam campaign just as the shopping season picks up steam
Ondrej KubovičESET experts have created a new decryption tool that can be used by Syrian victims of the GandCrab ransomware. It is based on a set of keys recently released by the malware operators
Ondrej KubovičWebsite altered to serve a malware-tainted version of otherwise legitimate software with the global event in Russia acting as a smokescreen
Ondrej KubovičThe infamous outbreak may no longer be causing mayhem worldwide but the threat that enabled it is still very much alive and posing a major threat to unpatched and unprotected systems
Ondrej KubovičRansomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as highlighted by the latest ESET research whitepaper.
Ondrej KubovičGeneral Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies – including encryption.
Ondrej KubovičEncryption can be the answer to many data security issues faced by small and medium businesses. Apart from protecting sensitive information from unauthorized use,this technology can also represent another step towards compliance with legislation.
Ondrej KubovičTorrents have many legitimate uses, in various segments. However, their popularity among users makes them also into an attractive vector for black-hats.
Ondrej KubovičMachine learning (ML) in eight blogposts!? In our last post, let’s take a peek under the hood of ESET’s cybersecurity engine and its ML gears.
Ondrej KubovičESET has released a decryptor for AESNI ransomware variants, including XData. Victims who still have encrypted files can now download it from ESET's utilities page.
Ondrej KubovičESET have prepared a new Crysis decrypting tool. Victims who still have their encrypted files can now download the decryptor from its utilities page.
Ondrej KubovičThe massive campaign that spread the WannaCry ransomware wasn’t the only large-scale infection misusing the EternalBlue and DoublePulsar exploits.
Ondrej KubovičWithout regular security updates, your endpoint will be left standing alone against an entire army of cybercriminals who see you as easy prey.
Ondrej KubovičPoor business decisions can be very costly, especially in cybersecurity, where so-called false positives can have very damaging consequences.
Ondrej KubovičA single protective technology means a single point of failure. A company aiming to build reliable and strong cybersecurity defenses should opt for a solution offering multiple complementary technologies.
Ondrej KubovičMachine learning alone is not enough to protect endpoints and predicting an attacker's next moves. Other security solutions and human input are needed.
Ondrej KubovičMachine learning (ML) is routinely cited by post-truth vendors as their biggest selling point, their main advantage. But ML – if it’s done properly – comes with problems and limitations.
Ondrej Kubovič