Latest Articles

Cybercrime

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

Cybercrime

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

The police sting spanned three continents and involved crackdowns in nine countries

Amer Owaida27 Oct 2021


ESET Research

Wslink: Unique and undocumented malicious loader that runs as a server

Wslink: Unique and undocumented malicious loader that runs as a server

ESET Research

Wslink: Unique and undocumented malicious loader that runs as a server

There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor

Vladislav Hrčka27 Oct 2021


Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Putting cybersecurity first: Why secure-by-design must be the norm

Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom

Phil Muncaster26 Oct 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT

Editor22 Oct 2021


Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

What’s lurking in the shadows? How to manage the security risks of shadow IT

Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era

Phil Muncaster22 Oct 2021


How To

Cybersecurity careers: What to know and how to get started

Cybersecurity careers: What to know and how to get started

How To

Cybersecurity careers: What to know and how to get started

Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track.

Editor21 Oct 2021


Privacy

Brave browser replaces Google with its own search engine

Brave browser replaces Google with its own search engine

Privacy

Brave browser replaces Google with its own search engine

Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon

Amer Owaida20 Oct 2021


Ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

Ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds

Amer Owaida19 Oct 2021


How To

A recipe for failure: Predictably poor passwords

A recipe for failure: Predictably poor passwords

How To

A recipe for failure: Predictably poor passwords

Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff.

Jake Moore19 Oct 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Phishing and how to avoid taking the bait – Offboarding employees securely – Why old malware refuses to die

Editor15 Oct 2021


Malware

Virus Bulletin: Old malware never dies – it just gets more targeted

Virus Bulletin: Old malware never dies – it just gets more targeted

Malware

Virus Bulletin: Old malware never dies – it just gets more targeted

Putting a precision payload on top of more generic malware makes perfect sense for malware operators

Cameron Camp15 Oct 2021


Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

Employee offboarding: Why companies must close a crucial gap in their security strategy

Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?

Phil Muncaster14 Oct 2021