Latest Articles

DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

How poking at the innards of satellites can make the future of cybersecurity in space more palatable

Cameron Camp09 Aug 2021


IISpy: A complex server-side backdoor with anti-forensic features

IISpy: A complex server-side backdoor with anti-forensic features

IISpy: A complex server-side backdoor with anti-forensic features

The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers

Zuzana Hromcová09 Aug 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET research dissects IIS web server threats – How IIStealer steals credit card data – The flood of spam in your inbox

Editor06 Aug 2021


Black Hat 2021: Lessons from a lawyer

Black Hat 2021: Lessons from a lawyer

Black Hat 2021: Lessons from a lawyer

Why companies and their security teams need to engage with a lawyer before an incident occurs

Tony Anscombe06 Aug 2021


Black Hat 2021: Wanted posters for ransomware slingers

Black Hat 2021: Wanted posters for ransomware slingers

Black Hat 2021: Wanted posters for ransomware slingers

Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge?

Cameron Camp06 Aug 2021


IIStealer: A server-side threat to e-commerce transactions

IIStealer: A server-side threat to e-commerce transactions

IIStealer: A server-side threat to e-commerce transactions

The first in our series on IIS threats looks at a malicious IIS extension that intercepts server transactions to steal credit card information

Zuzana Hromcová06 Aug 2021


Anatomy of native IIS malware

Anatomy of native IIS malware

Anatomy of native IIS malware

ESET researchers publish a white paper putting IIS web server threats under the microscope

Zuzana Hromcová and Anton Cherepanov06 Aug 2021


Is your personal information being abused?

Is your personal information being abused?

Is your personal information being abused?

Drowning in spam? A study presented at Black Hat USA 2021 examines if sharing your personal information with major companies contributes to the deluge of nuisance emails, texts and phone calls.

Tony Anscombe05 Aug 2021


Why cloud security is the key to unlocking value from hybrid working

Why cloud security is the key to unlocking value from hybrid working

Why cloud security is the key to unlocking value from hybrid working

How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?

Phil Muncaster05 Aug 2021


Black Hat 2021 – non-virtual edition

Black Hat 2021 – non-virtual edition

Black Hat 2021 – non-virtual edition

How is Black Hat USA 2021 different from the past editions of the conference and what are the themes may steal the show this year?

Cameron Camp04 Aug 2021


On course for a good hacking

On course for a good hacking

On course for a good hacking

A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK.

Jake Moore02 Aug 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Fraud taking aim at Airbnb users – Common scams doing the rounds on Amazon – Insider threats in the age of hybrid work

Editor30 Jul 2021


Apt Activity Report
MDR Protection