Latest Articles

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET unmasks FamousSparrow APT group – Stopping cloud data leaks – European cybercrime ring busted

Editor24 Sep 2021


Bug in macOS Finder allows remote code execution

Bug in macOS Finder allows remote code execution

Bug in macOS Finder allows remote code execution

While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented

Amer Owaida23 Sep 2021


FamousSparrow: A suspicious hotel guest

FamousSparrow: A suspicious hotel guest

FamousSparrow: A suspicious hotel guest

Yet another APT group that exploited the ProxyLogon vulnerability in March 2021

Matthieu Faou and Tahseen Bin Taj23 Sep 2021


Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.

Phil Muncaster22 Sep 2021


European police dismantle cybercrime ring with ties to Italian Mafia

European police dismantle cybercrime ring with ties to Italian Mafia

European police dismantle cybercrime ring with ties to Italian Mafia

The group used phishing, BEC and other types of attacks to swindle victims out of millions

Amer Owaida21 Sep 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Analysis of Numando banking trojan, steps to mitigate attack surface, and more! – Week in security with Tony Anscombe

Editor17 Sep 2021


Numando: Count once, code twice

Numando: Count once, code twice

Numando: Count once, code twice

The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.

ESET Research17 Sep 2021


Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML.

Amer Owaida15 Sep 2021


WhatsApp announces end-to-end encrypted backups

WhatsApp announces end-to-end encrypted backups

WhatsApp announces end-to-end encrypted backups

The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks.

Amer Owaida14 Sep 2021


What is an attack surface and how can you reduce it?

What is an attack surface and how can you reduce it?

What is an attack surface and how can you reduce it?

Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.

Phil Muncaster14 Sep 2021


Beware of these 5 common scams you can encounter on Instagram

Beware of these 5 common scams you can encounter on Instagram

Beware of these 5 common scams you can encounter on Instagram

From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims

Amer Owaida13 Sep 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Cyberespionnage against Kurdish ethnic group, and more! – Week in security with Tony Anscombe

Editor10 Sep 2021


Apt Activity Report
MDR Protection