Hybrid play: Leveling the playing field in online video gaming and beyond
Does VALORANT’s approach to cheating signal a turning point in how we deal with the continued hacks afflicting our hybrid world of work and play?
Education: Master of Arts in Philosophy, Bachelor of Computing Science (in progress).
Position and history at ESET:I joined ESET’s Global Public Relations team in 2019.
What type of malware do you hate the most? The one I don’t know is there.
Favorite activities: Rebuilding motorcycle engines and tinkering with the electronics of my motorized velocipede.
What is your golden rule for cyperspace? Pause and think before you click on any link.
When did you get your first computer and what kind was it? I remember my family proudly buying a Pentium in the late 90’s.
Favorite computer game/activity: Playing with my Raspberry Pi 4.
Does VALORANT’s approach to cheating signal a turning point in how we deal with the continued hacks afflicting our hybrid world of work and play?
Rene HoltESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA
Rene HoltLearning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings
Rene HoltCross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users
Rene HoltThe Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain
Rene HoltThe lead-up to the Canada Day festivities has brought a tax scam with it
Rene HoltEmotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
Rene HoltAs the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again
Rene HoltMake no mistake, counting on a computer is not as easy as it may seem. Here’s what happens when a number gets “too big”.
Rene HoltHundreds of thousands of attempts to exploit the vulnerability are under way
Rene HoltThe critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far
Rene HoltEver since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities
Rene HoltThe dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge
Rene Holt