Week in security with Tony Anscombe
ESET unearths a supply-chain attack against an Android emulator for PC and Mac – ESET research into malware targeting HPC clusters – How to prevent at least some zero-days
ESET unearths a supply-chain attack against an Android emulator for PC and Mac – ESET research into malware targeting HPC clusters – How to prevent at least some zero-days
Law enforcement disrupts Emotet – Wormable Android malware spreading via WhatsApp – Three iOS zero-day bugs squashed
The last Patch Tuesday of the year brings another fresh batch of fixes for Microsoft products and while the number may be lower the patches are no less important.
The new release patches a total of eight vulnerabilities affecting the desktop versions of the popular browser.
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
Could a career in cybersecurity be right for you? – Google discloses a zero-day bug in Windows – Video game maker Capcom suffers a breach
The updates come on the heels of news of attacks exploiting another zero-day in Chrome in tandem with a previously-unknown Windows flaw
Security challenges for connected medical devices – Zero-day in Chrome gets patched – How to avoid USB drive security woes
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
The browser maker rolls out updates on back-to-back days, including a patch to avoid unintentionally overloading DNS providers
What COVID-19 may mean for privacy rights – Managing supply-chain risks – Two Windows zero-days remain unpatched
Zero-day in Internet Explorer – Microsoft cloud leaked big – Dating apps accused of sharing user data with advertisers
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection
Some takeaways from CES 2020 – Firefox update plugs a zero-day – Facebook cracks down on deepfakes
ESET experts share how they got started in cybersecurity and whether or not a degree is needed for a career in the industry
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
ESET researchers break down a revamped set of tools that the Sednit group has added to its Zebrocy malware family
ESET researchers discovered a campaign that uses two malicious tools with similar capabilities to ensure both resilience and broader potential for the attackers
ESET researchers describe the ins and outs of a zero-day exploit that has been used for a highly targeted attack and reveal the name of the threat actor that deployed it
Cyberblackmail/sextortion again raises its not-so-pretty little head