Latest Articles

ESET Research

Anatomy of native IIS malware

Anatomy of native IIS malware

ESET Research

Anatomy of native IIS malware

ESET researchers publish a white paper putting IIS web server threats under the microscope

Zuzana Hromcová and Anton Cherepanov06 Aug 2021


Privacy

Is your personal information being abused?

Is your personal information being abused?

Privacy

Is your personal information being abused?

Drowning in spam? A study presented at Black Hat USA 2021 examines if sharing your personal information with major companies contributes to the deluge of nuisance emails, texts and phone calls.

Tony Anscombe05 Aug 2021


COVID-19, Business Security

Why cloud security is the key to unlocking value from hybrid working

Why cloud security is the key to unlocking value from hybrid working

COVID-19, Business Security

Why cloud security is the key to unlocking value from hybrid working

How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?

Phil Muncaster05 Aug 2021


Digital Security

Black Hat 2021 – non-virtual edition

Black Hat 2021 – non-virtual edition

Digital Security

Black Hat 2021 – non-virtual edition

How is Black Hat USA 2021 different from the past editions of the conference and what are the themes may steal the show this year?

Cameron Camp04 Aug 2021


Digital Security

On course for a good hacking

On course for a good hacking

Digital Security

On course for a good hacking

A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK.

Jake Moore02 Aug 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Fraud taking aim at Airbnb users – Common scams doing the rounds on Amazon – Insider threats in the age of hybrid work

Editor30 Jul 2021


Scams

Watch out for these scams targeting Amazon customers

Watch out for these scams targeting Amazon customers

Scams

Watch out for these scams targeting Amazon customers

Most people are fans of the convenience Amazon brings to online shopping, and that’s precisely what cybercriminals are betting on.

Amer Owaida30 Jul 2021


Digital Security

Cybersecurity agencies reveal most exploited vulnerabilities in the past two years

Cybersecurity agencies reveal most exploited vulnerabilities in the past two years

Digital Security

Cybersecurity agencies reveal most exploited vulnerabilities in the past two years

There are 30 vulnerabilities listed in total; organizations would do well to patch their systems if they haven’t done so yet

Amer Owaida29 Jul 2021


COVID-19, Business Security

Tackling the insider threat to the new hybrid workplace

Tackling the insider threat to the new hybrid workplace

COVID-19, Business Security

Tackling the insider threat to the new hybrid workplace

Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose

Phil Muncaster29 Jul 2021


Digital Security, Social Media

Most Twitter users haven’t enabled 2FA yet, report reveals

Most Twitter users haven’t enabled 2FA yet, report reveals

Digital Security, Social Media

Most Twitter users haven’t enabled 2FA yet, report reveals

Twitter’s transparency report revealed that users aren’t quick to adopt 2FA and once they do enable it, they choose the least secure option

Amer Owaida28 Jul 2021


Digital Security

Booking your next holiday? Beware these Airbnb scams

Booking your next holiday? Beware these Airbnb scams

Digital Security

Booking your next holiday? Beware these Airbnb scams

With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation.

Amer Owaida28 Jul 2021


Mobile Security

Apple releases patch for zero-day flaw in iOS, iPadOS and macOS

Apple releases patch for zero-day flaw in iOS, iPadOS and macOS

Mobile Security

Apple releases patch for zero-day flaw in iOS, iPadOS and macOS

The vulnerability is under active exploitation by unknown attackers and affects a wide range of Apple’s products.

Amer Owaida27 Jul 2021