Latest Articles

Business Security

Protecting the water supply – hacker edition

Protecting the water supply – hacker edition

Business Security

Protecting the water supply – hacker edition

What can municipalities do to better protect their water supply systems?

Cameron Camp11 Feb 2021


Digital Security

Microsoft patches actively exploited Windows kernel flaw

Microsoft patches actively exploited Windows kernel flaw

Digital Security

Microsoft patches actively exploited Windows kernel flaw

This month’s relatively humble bundle of security updates fixes 56 vulnerabilities, including a zero-day bug and 11 flaws rated as critical

Amer Owaida10 Feb 2021


Cybercrime

Hacker attempts to poison Florida city’s water supply

Hacker attempts to poison Florida city’s water supply

Cybercrime

Hacker attempts to poison Florida city’s water supply

While the incursion was thwarted in time, cyberattacks targeting critical infrastructure are a major cause for concern

Amer Owaida09 Feb 2021


Threat Reports, ESET Research

ESET Threat Report Q4 2020

ESET Threat Report Q4 2020

Threat Reports, ESET Research

ESET Threat Report Q4 2020

A view of the Q4 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč08 Feb 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET unearths a supply-chain attack against an Android emulator for PC and Mac – ESET research into malware targeting HPC clusters – How to prevent at least some zero-days

Editor05 Feb 2021


Digital Security

Google: Better patching could have prevented 1 in 4 zero-days last year

Google: Better patching could have prevented 1 in 4 zero-days last year

Digital Security

Google: Better patching could have prevented 1 in 4 zero-days last year

Vendors should fix the root cause of a vulnerability, rather than block just one path to triggering it, says Google

Amer Owaida04 Feb 2021


Social Media

Facebook etiquette: Behaviors you should avoid

Facebook etiquette: Behaviors you should avoid

Social Media

Facebook etiquette: Behaviors you should avoid

Sharing your thoughts or photos for the world to see is now as easy as pushing a button, but even a seemingly harmless post may come back to haunt you

Amer Owaida04 Feb 2021


COVID-19

Identity theft spikes amid pandemic

Identity theft spikes amid pandemic

COVID-19

Identity theft spikes amid pandemic

The US Federal Trade Commission received 1.4 million reports of identity theft last year, double the number from 2019

Amer Owaida03 Feb 2021


ESET Research

Kobalos – A complex Linux threat to high performance computing infrastructure

Kobalos – A complex Linux threat to high performance computing infrastructure

ESET Research

Kobalos – A complex Linux threat to high performance computing infrastructure

ESET researchers publish a white paper about unique multiplatform malware they’ve named Kobalos

Marc-Etienne M.Léveillé and Ignacio Sanmillan02 Feb 2021


ESET Research

Operation NightScout: Supply-chain attack targets online gaming in Asia

Operation NightScout: Supply-chain attack targets online gaming in Asia

ESET Research

Operation NightScout: Supply-chain attack targets online gaming in Asia

ESET researchers uncover a supply-chain attack used in a cyberespionage operation targeting online-gaming communities in Asia

Ignacio Sanmillan01 Feb 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Law enforcement disrupts Emotet – Wormable Android malware spreading via WhatsApp – Three iOS zero-day bugs squashed

Editor29 Jan 2021


Emotet botnet disrupted in global operation

Emotet botnet disrupted in global operation

Emotet botnet disrupted in global operation

The law enforcement action is one of the most significant operations against cybercriminal enterprises ever

Tomáš Foltýn28 Jan 2021


Threat Report
MSP Program