Latest Articles

Business Security

State-sponsored or financially motivated: Is there any difference anymore?

State-sponsored or financially motivated: Is there any difference anymore?

Business Security

State-sponsored or financially motivated: Is there any difference anymore?

What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?

Phil Muncaster21 Jun 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

5 steps to take to minimize damage from a ransomware attack – The double-edged sword of OSINT – Watch out for vishing scams

Editor18 Jun 2021


Ransomware

5 essential things to do before ransomware strikes

5 essential things to do before ransomware strikes

Ransomware

5 essential things to do before ransomware strikes

By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future

Cameron Camp18 Jun 2021


Privacy

Most health apps engage in unhealthy data-harvesting habits

Most health apps engage in unhealthy data-harvesting habits

Privacy

Most health apps engage in unhealthy data-harvesting habits

Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent

Amer Owaida17 Jun 2021


Digital Security

OSINT 101: What is open source intelligence and how is it used?

OSINT 101: What is open source intelligence and how is it used?

Digital Security

OSINT 101: What is open source intelligence and how is it used?

OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers

Phil Muncaster16 Jun 2021


Cybercrime

Microsoft takes down large-scale BEC operation

Microsoft takes down large-scale BEC operation

Cybercrime

Microsoft takes down large-scale BEC operation

The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information

Amer Owaida15 Jun 2021


How To

Vishing: What is it and how do I avoid getting scammed?

Vishing: What is it and how do I avoid getting scammed?

How To

Vishing: What is it and how do I avoid getting scammed?

How do vishing scams work, how do they impact businesses and individuals, and how can you protect yourself, your family and your business?

Phil Muncaster14 Jun 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET Research dissects campaigns by the Gelsemium and BackdoorDiplomacy APT groups – Hacking an orbiting satellite isn't necessarily the stuff of Hollywood

Editor11 Jun 2021


Cybercrime

Tracking ransomware cryptocurrency payments: What now for Bitcoin?

Tracking ransomware cryptocurrency payments: What now for Bitcoin?

Cybercrime

Tracking ransomware cryptocurrency payments: What now for Bitcoin?

Should we expect cybercriminals to ditch the pseudonymous cryptocurrency for other forms of payment that may be better at throwing law enforcement off the scent?

Cameron Camp11 Jun 2021


Digital Security

Google fixes actively exploited Chrome zero-day

Google fixes actively exploited Chrome zero-day

Digital Security

Google fixes actively exploited Chrome zero-day

The latest Chrome update patches a bumper crop of security flaws across the browser’s desktop versions

Amer Owaida10 Jun 2021


ESET Research

BackdoorDiplomacy: Upgrading from Quarian to Turian

BackdoorDiplomacy: Upgrading from Quarian to Turian

ESET Research

BackdoorDiplomacy: Upgrading from Quarian to Turian

ESET researchers discover a new campaign that evolved from the Quarian backdoor

Adam Burgher10 Jun 2021


ESET Research

Gelsemium: When threat actors go gardening

Gelsemium: When threat actors go gardening

ESET Research

Gelsemium: When threat actors go gardening

ESET researchers shed light on new campaigns from the quiet Gelsemium group

Matthieu Faou and Thomas Dupuy09 Jun 2021


Threat Report
MSP Program