Latest Articles

Bernhard Schölkopf: Is AI intelligent? | Starmus highlights

Bernhard Schölkopf: Is AI intelligent? | Starmus highlights

Bernhard Schölkopf: Is AI intelligent? | Starmus highlights

With AI's pattern recognition capabilities well-established, Mr. Schölkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?

Tomáš Foltýn27 Feb 2025


This month in security with Tony Anscombe – February 2025 edition

This month in security with Tony Anscombe – February 2025 edition

This month in security with Tony Anscombe – February 2025 edition

Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it's a wrap on another month filled with impactful security news

Editor26 Feb 2025


Laurie Anderson: Building an ARK | Starmus highlights

Laurie Anderson: Building an ARK | Starmus highlights

Laurie Anderson: Building an ARK | Starmus highlights

The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times

Tomáš Foltýn24 Feb 2025


Fake job offers target software developers with infostealers

Fake job offers target software developers with infostealers

Fake job offers target software developers with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers

Editor20 Feb 2025


DeceptiveDevelopment targets freelance developers

DeceptiveDevelopment targets freelance developers

DeceptiveDevelopment targets freelance developers

ESET researchers analyzed a campaign delivering malware bundled with job interview challenges

Matěj Havránek20 Feb 2025


No, you’re not fired – but beware of job termination scams

No, you’re not fired – but beware of job termination scams

No, you’re not fired – but beware of job termination scams

Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff

Phil Muncaster18 Feb 2025


Katharine Hayhoe: The most important climate equation | Starmus highlights

Katharine Hayhoe: The most important climate equation | Starmus highlights

Katharine Hayhoe: The most important climate equation | Starmus highlights

The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action

Tomáš Foltýn17 Feb 2025


Gaming or gambling? Lifting the lid on in-game loot boxes

Gaming or gambling? Lifting the lid on in-game loot boxes

Gaming or gambling? Lifting the lid on in-game loot boxes

The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down

Tomáš Foltýn13 Feb 2025


What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)

What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)

What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)

Ever wondered what it's like to hack for a living – legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.

Editor12 Feb 2025


How AI-driven identify fraud is causing havoc

How AI-driven identify fraud is causing havoc

How AI-driven identify fraud is causing havoc

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back

Phil Muncaster11 Feb 2025


Neil Lawrence: What makes us unique in the age of AI | Starmus highlights

Neil Lawrence: What makes us unique in the age of AI | Starmus highlights

Neil Lawrence: What makes us unique in the age of AI | Starmus highlights

As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?

Tomáš Foltýn10 Feb 2025


Patch or perish: How organizations can master vulnerability management

Patch or perish: How organizations can master vulnerability management

Patch or perish: How organizations can master vulnerability management

Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching

Phil Muncaster05 Feb 2025


Apt Activity Report
MDR Protection