All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
Search results for: "zero-day"
The browser maker rolls out updates on back-to-back days, including a patch to avoid unintentionally overloading DNS providers
What COVID-19 may mean for privacy rights – Managing supply-chain risks – Two Windows zero-days remain unpatched
Zero-day in Internet Explorer – Microsoft cloud leaked big – Dating apps accused of sharing user data with advertisers
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection
Some takeaways from CES 2020 – Firefox update plugs a zero-day – Facebook cracks down on deepfakes
ESET experts share how they got started in cybersecurity and whether or not a degree is needed for a career in the industry
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
ESET researchers break down a revamped set of tools that the Sednit group has added to its Zebrocy malware family
ESET researchers discovered a campaign that uses two malicious tools with similar capabilities to ensure both resilience and broader potential for the attackers
ESET researchers describe the ins and outs of a zero-day exploit that has been used for a highly targeted attack and reveal the name of the threat actor that deployed it
Cyberblackmail/sextortion again raises its not-so-pretty little head
The need for better balance on International Women's Day 2019. The Anti-Phishing Working Group offers a mixed bag of findings about the phishing landscape in 2018. Plus people should waste no time in updating Chrome to the browser's latest version.
As the use of this technology grows so does the risk that attackers may hijack it
ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe
PowerPool exploits zero-day vulnerability, Machine Learning and malware, plus susceptible power grids, all in the cybersecurity news with Tony Anscombe
Our lineup may seem heavy on the defensive side, but such is the nature of game plans for warding off a range of threats lurking in cyberspace
The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of our daily lives.
In 2017, the number of vulnerabilities smashed records set in previous years. According to CVE Details, more than 14,600 vulnerabilities were reported in 2017, compared to 6447 in 2016.
While the evolution of new smartphones creates more possibilities for the user, these new devices also creates more possibilities for hackers.