Latest Articles

Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.

Phil Muncaster22 Sep 2021


European police dismantle cybercrime ring with ties to Italian Mafia

European police dismantle cybercrime ring with ties to Italian Mafia

European police dismantle cybercrime ring with ties to Italian Mafia

The group used phishing, BEC and other types of attacks to swindle victims out of millions

Amer Owaida21 Sep 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Analysis of Numando banking trojan, steps to mitigate attack surface, and more! – Week in security with Tony Anscombe

Editor17 Sep 2021


Numando: Count once, code twice

Numando: Count once, code twice

Numando: Count once, code twice

The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.

ESET Research17 Sep 2021


Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML.

Amer Owaida15 Sep 2021


WhatsApp announces end-to-end encrypted backups

WhatsApp announces end-to-end encrypted backups

WhatsApp announces end-to-end encrypted backups

The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks.

Amer Owaida14 Sep 2021


What is an attack surface and how can you reduce it?

What is an attack surface and how can you reduce it?

What is an attack surface and how can you reduce it?

Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.

Phil Muncaster14 Sep 2021


Beware of these 5 common scams you can encounter on Instagram

Beware of these 5 common scams you can encounter on Instagram

Beware of these 5 common scams you can encounter on Instagram

From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims

Amer Owaida13 Sep 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Cyberespionnage against Kurdish ethnic group, and more! – Week in security with Tony Anscombe

Editor10 Sep 2021


Victims duped out of US$1.8 million by BEC and romance scam ring

Victims duped out of US$1.8 million by BEC and romance scam ring

Victims duped out of US$1.8 million by BEC and romance scam ring

Elderly men and women were the main targets of the romance scams operated by the fraudsters.

Amer Owaida10 Sep 2021


Howard University suffers cyberattack, suspends online classes in aftermath

Howard University suffers cyberattack, suspends online classes in aftermath

Howard University suffers cyberattack, suspends online classes in aftermath

The university suffered a ransomware attack; however, there is no evidence so far of data being accessed or stolen.

Amer Owaida09 Sep 2021


ProtonMail forced to log user’s IP address after order from Swiss authorities

ProtonMail forced to log user’s IP address after order from Swiss authorities

ProtonMail forced to log user’s IP address after order from Swiss authorities

Following the incident the company has updated its website and privacy policy to clarify its legal obligations to users

Amer Owaida07 Sep 2021


Apt Activity Report
MDR Protection