The latest Patch Tuesday knocks out a record-high number of vulnerabilities, including new bugs in the SMB protocol
Search results for: "WannaCryptor"
ESET research into malware taking aim at air-gapped networks – Dissecting a backdoor hitting high-profile targets in Asia – WannaCryptor three years later
A prolific ransomware gang vows to dial back its campaigns and spare healthcare organizations altogether during the COVID-19 crisis. It’s no cause for celebration.
If you’re looking to become a pro gamer, there are risks you shouldn’t play down
Today, Microsoft is officially pulling the plug on its support for Windows 7. What’s your plan?
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices
The infamous vulnerability has been exploited for a cryptocurrency mining campaign, but more damaging attacks may still be in store
The incidents send medical staff back to the days of pen and paper
Unlike BlueKeep, however, these vulnerabilities affect more recent Windows versions, including Windows 10
ESET researchers discover a new Android ransomware family that attempts to spread to victims’ contacts and deploys some unusual tricks
Keeping up with BlueKeep; or how many internet-facing systems, and in which countries and industries, remain ripe for exploitation?
Chinese smart home solutions provider Orvibo has leaked two billion logs from devices managed via its cloud platform, exposing sensitive information about their users
A trifecta of issues impact the organization’s cyber-resilience and conspire to put it in the firing line of cyberattacks
The alert comes on the heels of Microsoft’s second advisory calling on people to take action before it’s too late
ESET researchers zero in on commands executed by Zebrocy, a piece of malware from the extensive toolkit of the Sednit APT group
What you need to know about the critical security hole that could enable the next WannaCryptor
ESET researchers detail how ASUS's cloud service has been abused to distribute the Plead malware; in other news, ESET's telemetry shows that the use of the EternalBlue exploit is reaching new highs
What are the main types of backup operations and how can you avoid the sinking feeling that comes with the realization that you may not get your data back?
An analysis finds that '123456' is by far the most-commonly re-occurring password on breached accounts
Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk ransomware. Plus, advice on defending your organization against such attacks.