Latest Articles

Video

Is a RAT stealing your files? – Week in security with Tony Anscombe

Is a RAT stealing your files? – Week in security with Tony Anscombe

Video

Is a RAT stealing your files? – Week in security with Tony Anscombe

Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?

Editor16 Jun 2023


Kids Online

Stop Cyberbullying Day: Prevention is everyone's responsibility

Stop Cyberbullying Day: Prevention is everyone's responsibility

Kids Online

Stop Cyberbullying Day: Prevention is everyone's responsibility

Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves

Márk Szabó16 Jun 2023


ESET Research

Android GravityRAT goes after WhatsApp backups

Android GravityRAT goes after WhatsApp backups

ESET Research

Android GravityRAT goes after WhatsApp backups

ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files

Lukas Stefanko15 Jun 2023


Business Security

Cyber insurance: What is it and does my company need it?

Cyber insurance: What is it and does my company need it?

Business Security

Cyber insurance: What is it and does my company need it?

While not a 'get out of jail free card' for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident

Phil Muncaster13 Jun 2023


Video

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

Video

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities

Editor09 Jun 2023


ESET Research

Asylum Ambuscade: crimeware or cyberespionage?

Asylum Ambuscade: crimeware or cyberespionage?

ESET Research

Asylum Ambuscade: crimeware or cyberespionage?

A curious case of a threat actor at the border between crimeware and cyberespionage

Matthieu Faou08 Jun 2023


Internet of Things

Hear no evil: Ultrasound attacks on voice assistants

Hear no evil: Ultrasound attacks on voice assistants

Internet of Things

Hear no evil: Ultrasound attacks on voice assistants

How your voice assistant could do the bidding of a hacker – without you ever hearing a thing

Márk Szabó07 Jun 2023


Mobile Security

7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

Mobile Security

7 tips for spotting a fake mobile app

Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future

Roman Cuprik06 Jun 2023


Video

API security in the spotlight – Week in security with Tony Anscombe

API security in the spotlight – Week in security with Tony Anscombe

Video

API security in the spotlight – Week in security with Tony Anscombe

Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.

Editor02 Jun 2023


Secure Coding

All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

Secure Coding

All eyes on APIs: Top 3 API security risks and how to mitigate them

As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency

Phil Muncaster01 Jun 2023


Social Media

5 free OSINT tools for social media

5 free OSINT tools for social media

Social Media

5 free OSINT tools for social media

A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms

Martina López31 May 2023


Scams

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Scams

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys

Roman Cuprik30 May 2023


Apt Activity Report
MDR Protection