Latest Articles

Gotta fly: Lazarus targets the UAV sector

Gotta fly: Lazarus targets the UAV sector

Gotta fly: Lazarus targets the UAV sector

ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group

Peter Kálnai and Alexis Rapin23 Oct 2025


SnakeStealer: How it preys on personal data – and how you can protect yourself

SnakeStealer: How it preys on personal data – and how you can protect yourself

SnakeStealer: How it preys on personal data – and how you can protect yourself

Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts

Martina López22 Oct 2025


Cybersecurity Awareness Month 2025: Building resilience against ransomware

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?

Editor20 Oct 2025


Minecraft mods: Should you 'hack' your game?

Minecraft mods: Should you 'hack' your game?

Minecraft mods: Should you 'hack' your game?

Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.

Fabiana Ramírez Cuenca16 Oct 2025


IT service desks: The security blind spot that may put your business at risk

IT service desks: The security blind spot that may put your business at risk

IT service desks: The security blind spot that may put your business at risk

Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.

Phil Muncaster15 Oct 2025


Cybersecurity Awareness Month 2025: Why software patching matters more than ever

Cybersecurity Awareness Month 2025: Why software patching matters more than ever

Cybersecurity Awareness Month 2025: Why software patching matters more than ever

As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.

Editor14 Oct 2025


AI-aided malvertising: Exploiting a chatbot to spread scams

AI-aided malvertising: Exploiting a chatbot to spread scams

AI-aided malvertising: Exploiting a chatbot to spread scams

Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.

Phil Muncaster13 Oct 2025


How Uber seems to know where you are – even with restricted location permissions

How Uber seems to know where you are – even with restricted location permissions

How Uber seems to know where you are – even with restricted location permissions

Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.

Tony Anscombe09 Oct 2025


Cybersecurity Awareness Month 2025: Passwords alone are not enough

Cybersecurity Awareness Month 2025: Passwords alone are not enough

Cybersecurity Awareness Month 2025: Passwords alone are not enough

Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.

Editor08 Oct 2025


The case for cybersecurity: Why successful businesses are built on protection

The case for cybersecurity: Why successful businesses are built on protection

The case for cybersecurity: Why successful businesses are built on protection

Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center

Phil Muncaster07 Oct 2025


Beware of threats lurking in booby-trapped PDF files

Beware of threats lurking in booby-trapped PDF files

Beware of threats lurking in booby-trapped PDF files

Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.

Fabiana Ramírez Cuenca06 Oct 2025


Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging

Phil Muncaster03 Oct 2025


Apt Activity Report
MDR Protection