USENIX Security ’22 – Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Yale University; Xiao Wang – ‘ppSAT: Towards Two-Party Private SAT Solving’Our thanks to USENIX...
Play Ransomware gang has begun to leak data stolen from City of Oakland
Play Ransomware gang has begun to leak data stolen from City of OaklandThe Play ransomware gang has finally begun to leak the data stolen from the...
New cyberattack tactics rise up as ransomware payouts increase
New cyberattack tactics rise up as ransomware payouts increaseWhile phishing, business email compromise (BEC), and ransomware still rank among the most popular cyberattack techniques, a mix...
BidenCash leaks 2.1M stolen credit/debit cards
BidenCash leaks 2.1M stolen credit/debit cardsThe dark web carding site BidenCash recently leaked for free a collection of approximately 2 million stolen payment card numbers. An...
FiXS, a new ATM malware that is targeting Mexican banks
FiXS, a new ATM malware that is targeting Mexican banksResearchers at Metabase Q discovered a new ATM malware, dubbed FiXS, that was employed in attacks against Mexican banks...
Security Affairs newsletter Round 409 by Pierluigi Paganini
Security Affairs newsletter Round 409 by Pierluigi PaganiniA new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are...
Malware: 5 Tips for Fighting the Malicious Software
Malware: 5 Tips for Fighting the Malicious Software Malware—the term seems to be at the center of the news every day, with each headline telling of...
McAfee Awarded Best Protection by the Labs at AV-TEST
McAfee Awarded Best Protection by the Labs at AV-TEST Each year the independent labs at AV-TEST announce their best products in IT security, and McAfee has...
New TPM 2.0 flaws could let hackers steal cryptographic keys
New TPM 2.0 flaws could let hackers steal cryptographic keysThe Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow...
Bing Chat has a secret ‘Celebrity’ mode to impersonate celebrities
Bing Chat has a secret ‘Celebrity’ mode to impersonate celebritiesA secret Bing Chat 'Celebrity' mode allows users to instruct the AI to impersonate celebrities, answering questions...
Ransomware gang leaks data stolen from City of Oakland
Ransomware gang leaks data stolen from City of OaklandThe Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen...
New cyberattack tactics rise up as ransomware payouts increase
New cyberattack tactics rise up as ransomware payouts increaseWhile phishing, business email compromise (BEC), and ransomware still rank among the most popular cyberattack techniques, a mix...
5 valuable skills your children can learn by playing video games
5 valuable skills your children can learn by playing video gamesGaming can help your children build and sharpen a range of life skills that will stand...
Mastodon vs. Twitter: Know the differences
Mastodon vs. Twitter: Know the differencesLooking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare...
Why your data is more valuable than you may realize
Why your data is more valuable than you may realizeThe data trail you leave behind whenever you're online is bigger – and more revealing – than...
SwiftSlicer: New destructive wiper malware strikes Ukraine
SwiftSlicer: New destructive wiper malware strikes UkraineSandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post SwiftSlicer: New destructive wiper malware...
Are you in control of your personal data? – Week in security with Tony Anscombe
Are you in control of your personal data? – Week in security with Tony AnscombeData Privacy Week is a reminder to protect your data – all...
ESET APT Activity Report T3 2022
ESET APT Activity Report T3 2022An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET...
Less is more: Conquer your digital clutter before it conquers you
Less is more: Conquer your digital clutter before it conquers youLose what you don’t use and other easy ways to limit your digital footprint and strengthen...
Are online surveys legit and safe? Watch out for survey scams
Are online surveys legit and safe? Watch out for survey scams“Can I tell a legitimate survey apart from a fake one?” is the single most important...
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony AnscombeAs our latest APT Activity Report makes abundantly clear, the threat of...
Online safety laws: What’s in store for children’s digital playgrounds?
Online safety laws: What’s in store for children’s digital playgrounds?As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push...
Into the void: Your tech and security in digital darkness
Into the void: Your tech and security in digital darknessNo internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of...
ESET Threat Report T3 2022
ESET Threat Report T3 2022A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and...
Alexa, who else is listening?
Alexa, who else is listening?Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening? appeared first...
Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
Key findings from the latest ESET Threat Report – Week in security with Tony AnscombeWhat is behind the drop in ransomware and what should still be...
Confident cybersecurity means fewer headaches for SMBs
Confident cybersecurity means fewer headaches for SMBsSmall and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts The post...
ChatGPT, will you be my Valentine?
ChatGPT, will you be my Valentine?Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot...
10 signs that scammers have you in their sights
10 signs that scammers have you in their sightsDon’t be their next victim – here’s a handy round-up of some the most common signs that should...
These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia
These aren’t the apps you’re looking for: fake installers targeting Southeast and East AsiaESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT...




























