ESET research into Turla's new campaign – What is CEO fraud and how to defend against it – How Microsoft enterprise accounts get hacked
An unknown number of people had their personal data exposed as hackers accessed database backup files
What is CEO fraud, why is it so prevalent, and how can organizations recognize and defend themselves against these scams?
Does your child dream of becoming a YouTube or Instagram celebrity? The influencer lifestyle is not as picture-perfect as it may seem.
The incident affected our office network, says ENTSO-E, as it implements measures to avoid future cyber-incursions
Can an old APT learn new tricks? Turla’s TTPs are largely unchanged, but the group recently added a Python backdoor.
NordVPN praised its bug bounty program and said that a fix had been shipped within two days
Only 11 percent of all enterprise accounts have multi-factor authentication enabled
ESET research into the Guildma banking trojan – What can you do to stay safe from online fraud – Why become a cybersecurity professional
The misconfigured database was accessed by an unauthorized party on at least one occasion
The fourth installment of our occasional series demystifying Latin American banking trojans
ESET Chief Security Evangelist Tony Anscombe sat down with us to share his insights on how to avoid falling prey to online fraud
With access to text messages and the ability to make fraudulent phone calls, attackers could wreak more damage than you'd think
By contrast, two other web browsers share identifiers that are tied to the device hardware and so persist even across fresh installs
From competitive salaries to ever-evolving job descriptions, there are myriad reasons why a cybersecurity career could be right for you
And how would you know if the algorithm was tampered with?
ESET research uncovers a vulnerability in Wi-Fi chips – How to protect yourself against tax refund fraud – Clearview AI suffers a data breach
People in other parts of the world also have the option to flip on DNS encryption
The digital age has added a whole new dimension to hurtful behavior, and we look at some of the key features that set in-person and online bullying apart
The startup came under scrutiny after it emerged that it had amassed 3 billion photos from social media for its facial recognition software