Latest Articles

Cybercrime

Hackers swipe almost $100 million from major cryptocurrency exchange

Hackers swipe almost $100 million from major cryptocurrency exchange

Cybercrime

Hackers swipe almost $100 million from major cryptocurrency exchange

Japanese cryptocurrency exchange Liquid suspends cryptocurrency deposits and withdrawals and moves its assets into cold storage

Amer Owaida20 Aug 2021


Ransomware, Business Security

Are you, the customer, the one paying the ransomware demand?

Are you, the customer, the one paying the ransomware demand?

Ransomware, Business Security

Are you, the customer, the one paying the ransomware demand?

Ransomware payments may have greater implications than you thought – and not just for the companies that paid up

Tony Anscombe19 Aug 2021


COVID-19

Health authorities in 40 countries targeted by COVID-19 vaccine scammers

Health authorities in 40 countries targeted by COVID-19 vaccine scammers

COVID-19

Health authorities in 40 countries targeted by COVID-19 vaccine scammers

Fraudsters impersonate vaccine manufacturers and authorities overseeing vaccine distribution efforts, INTERPOL warns

Amer Owaida18 Aug 2021


Digital Security

Nearly 2 million records from terrorist watchlist exposed online

Nearly 2 million records from terrorist watchlist exposed online

Digital Security

Nearly 2 million records from terrorist watchlist exposed online

The secret list was exposed online for three weeks, allowing anyone to access it without any kind of authentication

Amer Owaida17 Aug 2021


Digital Security

Dumpster diving is a filthy business

Dumpster diving is a filthy business

Digital Security

Dumpster diving is a filthy business

One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin

Jake Moore17 Aug 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware

Editor13 Aug 2021


COVID-19, Business Security

Examining threats to device security in the hybrid workplace

Examining threats to device security in the hybrid workplace

COVID-19, Business Security

Examining threats to device security in the hybrid workplace

As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands

Phil Muncaster12 Aug 2021


ESET Research

IISerpent: Malware-driven SEO fraud as a service

IISerpent: Malware-driven SEO fraud as a service

ESET Research

IISerpent: Malware-driven SEO fraud as a service

The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites

Zuzana Hromcová11 Aug 2021


Scams

Deepfakes – the bot made me do it

Deepfakes – the bot made me do it

Scams

Deepfakes – the bot made me do it

As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud?

Tony Anscombe10 Aug 2021


Ransomware, Business Security

Ransomware runs rampant, so how can you combat this threat?

Ransomware runs rampant, so how can you combat this threat?

Ransomware, Business Security

Ransomware runs rampant, so how can you combat this threat?

A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim

Ondrej Kubovič10 Aug 2021


Digital Security

DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

Digital Security

DEF CON 29: Satellite hacking 101

How poking at the innards of satellites can make the future of cybersecurity in space more palatable

Cameron Camp09 Aug 2021


ESET Research

IISpy: A complex server-side backdoor with anti-forensic features

IISpy: A complex server-side backdoor with anti-forensic features

ESET Research

IISpy: A complex server-side backdoor with anti-forensic features

The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers

Zuzana Hromcová09 Aug 2021