Latest Articles

We Live Progress

10 tips to ace your cybersecurity job interview

10 tips to ace your cybersecurity job interview

We Live Progress

10 tips to ace your cybersecurity job interview

Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10 tips will put you on the right track.

Phil Muncaster18 Sep 2023


Video

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

Ballistic Bobcat's Sponsor backdoor  – Week in security with Tony Anscombe

Video

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States

Editor14 Sep 2023


Scams

Read it right! How to spot scams on Reddit

Read it right! How to spot scams on Reddit

Scams

Read it right! How to spot scams on Reddit

Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as “the front page of the Internet”?

Roman Cuprik13 Sep 2023


ESET Research

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims

ESET Research12 Sep 2023


ESET Research

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

ESET Research

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

ESET Research uncovers the Sponsoring Access campaign, which utilizes an undocumented Ballistic Bobcat backdoor we have named Sponsor

Adam Burgher11 Sep 2023


Video

Will you give X your biometric data? – Week in security with Tony Anscombe

Will you give X your biometric data? – Week in security with Tony Anscombe

Video

Will you give X your biometric data? – Week in security with Tony Anscombe

The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured

Editor08 Sep 2023


Business Security

Staying ahead of threats: 5 cybercrime trends to watch

Staying ahead of threats: 5 cybercrime trends to watch

Business Security

Staying ahead of threats: 5 cybercrime trends to watch

New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought

Phil Muncaster06 Sep 2023


Scams

Getting off the hook: 10 steps to take after clicking on a phishing link

Getting off the hook: 10 steps to take after clicking on a phishing link

Scams

Getting off the hook: 10 steps to take after clicking on a phishing link

Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.

Roman Cuprik04 Sep 2023


Video

Fake Signal and Telegram apps – Week in security with Tony Anscombe

Fake Signal and Telegram apps – Week in security with Tony Anscombe

Video

Fake Signal and Telegram apps – Week in security with Tony Anscombe

ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites

Editor31 Aug 2023


Privacy

What you need to know about iCloud Private Relay

What you need to know about iCloud Private Relay

Privacy

What you need to know about iCloud Private Relay

If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend — but is it a true VPN service? The devil is in the details.

Márk Szabó31 Aug 2023


ESET Research

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

ESET Research

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs

Lukas Stefanko30 Aug 2023


Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

The campaign started with a trojanized version of unsupported financial software

Roman Cuprik28 Aug 2023