Latest Articles

We Live Progress

Irresistible: Hooks, habits and why you can’t put down your phone

Irresistible: Hooks, habits and why you can’t put down your phone

We Live Progress

Irresistible: Hooks, habits and why you can’t put down your phone

Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices.

Imogen Byers05 Mar 2024


Video

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

Video

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year

Editor01 Mar 2024


Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

David González Cuautle29 Feb 2024


Business Security

Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

Business Security

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk

Márk Szabó28 Feb 2024


Social Media

10 things to avoid posting on social media – and why

10 things to avoid posting on social media – and why

Social Media

10 things to avoid posting on social media – and why

Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.

Phil Muncaster26 Feb 2024


Video

PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe

PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe

Video

PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe

Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects

Editor23 Feb 2024


Digital Security

Everything you need to know about IP grabbers

Everything you need to know about IP grabbers

Digital Security

Everything you need to know about IP grabbers

Unsuspecting users beware, IP grabbers do not ask for your permission.

Márk Szabó22 Feb 2024


ESET Research, Ukraine Crisis – Digital Security Resource Center

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

ESET Research, Ukraine Crisis – Digital Security Resource Center

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

A mix of PSYOPs, espionage and … fake Canadian pharmacies!

Matthieu Faou21 Feb 2024


How To

Watching out for the fakes: How to spot online disinformation

Watching out for the fakes: How to spot online disinformation

How To

Watching out for the fakes: How to spot online disinformation

Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes?

Márk Szabó20 Feb 2024


Video

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

Video

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals

Editor16 Feb 2024


Video

What is AI, really? | Unlocked 403: A cybersecurity podcast

What is AI, really? | Unlocked 403: A cybersecurity podcast

Video

What is AI, really? | Unlocked 403: A cybersecurity podcast

Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack AI's basics, applications and broader implications.

Alžbeta Kovaľová15 Feb 2024


Cybercrime

The art of digital sleuthing: How digital forensics unlocks the truth

The art of digital sleuthing: How digital forensics unlocks the truth

Cybercrime

The art of digital sleuthing: How digital forensics unlocks the truth

Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell

Lucas Paus and Mario Micucci14 Feb 2024