Latest Articles

Gamaredon X Turla collab

Gamaredon X Turla collab

Gamaredon X Turla collab

Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine

Matthieu Faou and Zoltán Rusnák19 Sep 2025


Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Small businesses, big targets: Protecting your business against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises

Phil Muncaster18 Sep 2025


HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality

Editor16 Sep 2025


Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal

Martin Smolár12 Sep 2025


Are cybercriminals hacking your systems – or just logging in?

Are cybercriminals hacking your systems – or just logging in?

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight

Phil Muncaster11 Sep 2025


Preventing business disruption and building cyber-resilience with MDR

Preventing business disruption and building cyber-resilience with MDR

Preventing business disruption and building cyber-resilience with MDR

Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy

Phil Muncaster09 Sep 2025


Under lock and key: Safeguarding business data with encryption

Under lock and key: Safeguarding business data with encryption

Under lock and key: Safeguarding business data with encryption

As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose

Phil Muncaster05 Sep 2025


GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results

Fernando Tavella04 Sep 2025


This month in security with Tony Anscombe – August 2025 edition

This month in security with Tony Anscombe – August 2025 edition

This month in security with Tony Anscombe – August 2025 edition

From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news

Editor28 Aug 2025


Don’t let “back to school” become “back to (cyber)bullying”

Don’t let “back to school” become “back to (cyber)bullying”

Don’t let “back to school” become “back to (cyber)bullying”

Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back

Phil Muncaster27 Aug 2025


First known AI-powered ransomware uncovered by ESET Research

First known AI-powered ransomware uncovered by ESET Research

First known AI-powered ransomware uncovered by ESET Research

The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats

Anton Cherepanov and Peter Strýček26 Aug 2025


"What happens online stays online" and other cyberbullying myths, debunked

"What happens online stays online" and other cyberbullying myths, debunked

"What happens online stays online" and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.

Phil Muncaster21 Aug 2025


Apt Activity Report
MDR Protection