Latest Articles

Business Security

Patch or perish: How organizations can master vulnerability management

Patch or perish: How organizations can master vulnerability management

Business Security

Patch or perish: How organizations can master vulnerability management

Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching

Phil Muncaster05 Feb 2025


We Live Science

Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights

Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights

We Live Science

Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights

Left unchecked, AI's energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry without sacrificing performance?

Editor04 Feb 2025


Digital Security

How scammers are exploiting DeepSeek's rise

How scammers are exploiting DeepSeek's rise

Digital Security

How scammers are exploiting DeepSeek's rise

As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek

Editor31 Jan 2025


Video

This month in security with Tony Anscombe – January 2025 edition

This month in security with Tony Anscombe – January 2025 edition

Video

This month in security with Tony Anscombe – January 2025 edition

DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy

Editor30 Jan 2025


Business Security

Untrustworthy AI: How to deal with data poisoning

Untrustworthy AI: How to deal with data poisoning

Business Security

Untrustworthy AI: How to deal with data poisoning

You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so

Márk Szabó30 Jan 2025


We Live Science

Brian Greene: Until the end of time | Starmus highlights

Brian Greene: Until the end of time | Starmus highlights

We Live Science

Brian Greene: Until the end of time | Starmus highlights

The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity

Editor29 Jan 2025


Scams

Going (for) broke: 6 common online betting scams and how to avoid them

Going (for) broke: 6 common online betting scams and how to avoid them

Scams

Going (for) broke: 6 common online betting scams and how to avoid them

Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly set by scammers

Phil Muncaster28 Jan 2025


Business Security

The evolving landscape of data privacy: Key trends to shape 2025

The evolving landscape of data privacy: Key trends to shape 2025

Business Security

The evolving landscape of data privacy: Key trends to shape 2025

Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams

Phil Muncaster23 Jan 2025


ESET Research

PlushDaemon compromises supply chain of Korean VPN service

PlushDaemon compromises supply chain of Korean VPN service

ESET Research

PlushDaemon compromises supply chain of Korean VPN service

ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon

Facundo Muñoz22 Jan 2025


Business Security

Under lock and key: Protecting corporate data from cyberthreats in 2025

Under lock and key: Protecting corporate data from cyberthreats in 2025

Business Security

Under lock and key: Protecting corporate data from cyberthreats in 2025

Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage

Phil Muncaster21 Jan 2025


Video

UEFI Secure Boot: Not so secure

UEFI Secure Boot: Not so secure

Video

UEFI Secure Boot: Not so secure

ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems

Editor16 Jan 2025


ESET Research

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

ESET Research

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

The story of a signed UEFI application allowing a UEFI Secure Boot bypass

Martin Smolár16 Jan 2025


Apt Activity Report
MDR Protection