Latest Articles

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Current LLMs are just not mature enough for high-level tasks

Tony Anscombe12 Aug 2023


20k security folks in the desert – Week in security with Tony Anscombe

20k security folks in the desert – Week in security with Tony Anscombe

20k security folks in the desert – Week in security with Tony Anscombe

Unsurprisingly, artificial intelligence took the center stage at this year's edition of Black Hat, one of the world's largest gatherings of cybersecurity professionals

Editor11 Aug 2023


Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

What happens to cyberweapons after a cyberwar?

Cameron Camp11 Aug 2023


ESET Research Podcast: Unmasking MoustachedBouncer

ESET Research Podcast: Unmasking MoustachedBouncer

ESET Research Podcast: Unmasking MoustachedBouncer

Listen as ESET's Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies in Belarus

ESET Research10 Aug 2023


MoustachedBouncer: Espionage against foreign diplomats in Belarus

MoustachedBouncer: Espionage against foreign diplomats in Belarus

MoustachedBouncer: Espionage against foreign diplomats in Belarus

Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!

Matthieu Faou10 Aug 2023


Time is money, and online game scammers have lots of it

Time is money, and online game scammers have lots of it

Time is money, and online game scammers have lots of it

Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?

Márk Szabó07 Aug 2023


Check cybersecurity pre-invest – Week in security with Tony Anscombe

Check cybersecurity pre-invest – Week in security with Tony Anscombe

Check cybersecurity pre-invest – Week in security with Tony Anscombe

When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules.

Editor04 Aug 2023


Fingerprints all over: Can browser fingerprinting increase website security?

Fingerprints all over: Can browser fingerprinting increase website security?

Fingerprints all over: Can browser fingerprinting increase website security?

Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?

Márk Szabó03 Aug 2023


The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.

Raj Kapoor02 Aug 2023


Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Current cryptographic security methods watch out - quantum computing is coming for your lunch.

Cameron Camp01 Aug 2023


Is backdoor access oppressive? – Week in security with Tony Anscombe

Is backdoor access oppressive? – Week in security with Tony Anscombe

Is backdoor access oppressive? – Week in security with Tony Anscombe

Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?

Editor28 Jul 2023


Gathering dust and data: How robotic vacuums can spy on you

Gathering dust and data: How robotic vacuums can spy on you

Gathering dust and data: How robotic vacuums can spy on you

Mitigate the risk of data leaks with a careful review of the product and the proper settings.

Roman Cuprik26 Jul 2023


Apt Activity Report
MDR Protection