Latest Articles

New spyware campaigns target privacy-conscious Android users in the UAE

New spyware campaigns target privacy-conscious Android users in the UAE

New spyware campaigns target privacy-conscious Android users in the UAE

ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates

Lukas Stefanko02 Oct 2025


Cybersecurity Awareness Month 2025: Knowledge is power

Cybersecurity Awareness Month 2025: Knowledge is power

Cybersecurity Awareness Month 2025: Knowledge is power

We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals

Editor01 Oct 2025


This month in security with Tony Anscombe – September 2025 edition

This month in security with Tony Anscombe – September 2025 edition

This month in security with Tony Anscombe – September 2025 edition

The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans

Editor29 Sep 2025


Roblox executors: It’s all fun and games until someone gets hacked

Roblox executors: It’s all fun and games until someone gets hacked

Roblox executors: It’s all fun and games until someone gets hacked

You could be getting more than you bargained for when you download that cheat tool promising quick wins

Christian Ali Bravo and Fabiana Ramírez Cuenca26 Sep 2025


DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception

DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception

DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception

Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers

Peter Kálnai and Matěj Havránek25 Sep 2025


Watch out for SVG files booby-trapped with malware

Watch out for SVG files booby-trapped with malware

Watch out for SVG files booby-trapped with malware

What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware

Camilo Gutiérrez Amaya22 Sep 2025


Gamaredon X Turla collab

Gamaredon X Turla collab

Gamaredon X Turla collab

Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine

Matthieu Faou and Zoltán Rusnák19 Sep 2025


Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises

Phil Muncaster18 Sep 2025


HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality

Editor16 Sep 2025


Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal

Martin Smolár12 Sep 2025


Are cybercriminals hacking your systems – or just logging in?

Are cybercriminals hacking your systems – or just logging in?

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight

Phil Muncaster11 Sep 2025


Preventing business disruption and building cyber-resilience with MDR

Preventing business disruption and building cyber-resilience with MDR

Preventing business disruption and building cyber-resilience with MDR

Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy

Phil Muncaster09 Sep 2025


Apt Activity Report
MDR Protection