Although only seeing tepid adoption to date, adaptive access and authentication is set to gain steam among businesses this year as organizations pursue zero-trust capabilities that...
Day: April 3, 2023
Is Decentralized Identity About to Reach an Inflection Point?
Although the decentralized identity market is still in its infancy, it has been gaining traction in recent years and has the potential to change existing identity,...
Vulkan Playbook Leak Exposes Russia’s Plans for Worldwide Cyberwar
The release of thousands of pages of confidential documents has exposed Russian military and intelligence agencies’ grand plans for using their cyberwar capabilities in disinformation campaigns,...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
US threatens to ban TikTok unless Chinese owners divest
The Biden administration has threatened to ban TikTok in the US unless the social media company’s Chinese owners divest their stakes in it, according to news...
UK bans TikTok from government mobile phones
Britain is to ban the Chinese-owned video-sharing app TikTok from ministers’ and civil servants’ mobile phones, bringing the UK in line with the US and the...
AI can fool voice recognition used to verify identity by Centrelink and Australian tax office
A voice identification system used by the Australian government for millions of people has a serious security flaw, a Guardian Australia investigation has found. Centrelink and...
UK expected to ban TikTok from government mobile phones
Britain is expected to announce a ban on the Chinese owned video-sharing app TikTok on government mobile phones imminently, bringing the UK inline with the US...
TikTok unveils European data security plan amid calls for US ban
TikTok has announced a data security regime for protecting user information across Europe, as political pressure increases in the US to ban the social video app....
Labor plan to beef up government’s cyber powers faces Senate block
Labor could face Senate difficulties if it tries to dramatically expand the government’s powers to directly intervene in companies’ IT systems during cyber-attacks. Under existing laws...
Rishi Sunak faces calls to ban TikTok use by government officials
Rishi Sunak has been urged to ban government officials from using TikTok in line with moves by the EU and US, amid growing cybersecurity fears over...
European Commission bans staff using TikTok on work devices over security fears
The EU’s executive body has banned its thousands of staff from using TikTok over cybersecurity concerns, a decision the Chinese-owned social video app has criticised as...
Medibank class action launched after massive hack put private information of millions on dark web
The law firm Baker McKenzie has launched a class action lawsuit against Medibank over the health insurer’s massive cyber attack last year that resulted in the...
TechScape: Why Twitter ending free access to its APIs should be a ‘wake-up call’
APIs may not seem like the sexiest thing to write about in a tech newsletter, but bear with me. Because APIs – or application programming interfaces...
Security Affairs newsletter Round 413 by Pierluigi Paganini – International edition
Privacy Overview This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as...
Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal
Files leaked by Russian IT contractor NTC Vulkan show that Russia-linked Sandworm APT requested it to develop offensive tools. Documents leaked from Russian IT contractor NTC...
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol ESET researchers have analyzed MQsTTang, a new custom...
BlackLotus UEFI bootkit: Myth confirmed
The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality The number of UEFI vulnerabilities discovered in recent...
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022
And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022....
One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected? It’s been twelve months since Russia invaded Ukraine, and...
A year of wiper attacks in Ukraine
ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022 This blogpost presents a...
WinorDLL64: A backdoor from the vast Lazarus arsenal?
The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group ESET researchers have discovered one...
Writing like a boss with ChatGPT and how to get better at spotting phishing scams
It’s never been easier to write a convincing message that can trick you into handing over your money or personal data ChatGPT has been taking the...
ESET SMB Digital Security Sentiment Report: The damaging effects of a breach
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are...
Will ChatGPT start writing killer malware?
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware? ChatGPT didn’t write this article –...
Search ads abused to spread malware – Week in security with Tony Anscombe
Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites This week, the ESET research team has...
Security amidst a global frost
No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield As military and tech gather to address...
These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia
ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via malicious websites linked in ads that appear in Google search...
10 signs that scammers have you in their sights
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing We all spend...
ChatGPT, will you be my Valentine?
Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen...