Latest Articles

Brian Greene: Until the end of time | Starmus highlights

Brian Greene: Until the end of time | Starmus highlights

Brian Greene: Until the end of time | Starmus highlights

The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity

Tomáš Foltýn29 Jan 2025


Going (for) broke: 6 common online betting scams and how to avoid them

Going (for) broke: 6 common online betting scams and how to avoid them

Going (for) broke: 6 common online betting scams and how to avoid them

Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly set by scammers

Phil Muncaster28 Jan 2025


The evolving landscape of data privacy: Key trends to shape 2025

The evolving landscape of data privacy: Key trends to shape 2025

The evolving landscape of data privacy: Key trends to shape 2025

Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams

Phil Muncaster23 Jan 2025


PlushDaemon compromises supply chain of Korean VPN service

PlushDaemon compromises supply chain of Korean VPN service

PlushDaemon compromises supply chain of Korean VPN service

ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon

Facundo Muñoz22 Jan 2025


Under lock and key: Protecting corporate data from cyberthreats in 2025

Under lock and key: Protecting corporate data from cyberthreats in 2025

Under lock and key: Protecting corporate data from cyberthreats in 2025

Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage

Phil Muncaster21 Jan 2025


UEFI Secure Boot: Not so secure

UEFI Secure Boot: Not so secure

UEFI Secure Boot: Not so secure

ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems

Editor16 Jan 2025


Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

The story of a signed UEFI application allowing a UEFI Secure Boot bypass

Martin Smolár16 Jan 2025


Cybersecurity and AI: What does 2025 have in store?

Cybersecurity and AI: What does 2025 have in store?

Cybersecurity and AI: What does 2025 have in store?

In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats

Phil Muncaster15 Jan 2025


Protecting children online: Where Florida’s new law falls short

Protecting children online: Where Florida’s new law falls short

Protecting children online: Where Florida’s new law falls short

Some of the state’s new child safety law can be easily circumvented. Should it have gone further?

Tony Anscombe14 Jan 2025


Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe

Phil Muncaster09 Jan 2025


State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats

Phil Muncaster07 Jan 2025


AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.

Cameron Camp06 Jan 2025


Apt Activity Report
MDR Protection