Security amidst a global frostNo longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield The post Security...
Search ads abused to spread malware – Week in security with Tony Anscombe
Search ads abused to spread malware – Week in security with Tony AnscombeThreat actors used search engine ads to impersonate makers of popular software and direct...
Will ChatGPT start writing killer malware?
Will ChatGPT start writing killer malware?AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware? The...
ESET SMB Digital Security Sentiment Report: The damaging effects of a breach
ESET SMB Digital Security Sentiment Report: The damaging effects of a breachSMBs need to not only reduce their odds of being hit by an attack, but...
Writing like a boss with ChatGPT and how to get better at spotting phishing scams
Writing like a boss with ChatGPT and how to get better at spotting phishing scamsIt’s never been easier to write a convincing message that can trick...
WinorDLL64: A backdoor from the vast Lazarus arsenal?
WinorDLL64: A backdoor from the vast Lazarus arsenal?The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned...
A year of wiper attacks in Ukraine
A year of wiper attacks in UkraineESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine...
One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe
One year on, how is the war playing out in cyberspace? – Week in security with Tony AnscombeWith the conflict in Ukraine passing the one-year mark,...
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022And that’s just the tip of the iceberg when it comes to the trends that...
BlackLotus UEFI bootkit: Myth confirmed
BlackLotus UEFI bootkit: Myth confirmedThe first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality The post BlackLotus UEFI...
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTTESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via...
What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe
What does $5,000 buy you on a hacking forum? – Week in security with Tony AnscombeA bootkit that ESET researchers have discovered in the wild is...
How to Tackle the Top SaaS Challenges of 2023
How to Tackle the Top SaaS Challenges of 2023Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies...
National Cybersecurity Strategy | Contrast Security
National Cybersecurity Strategy | Contrast Security Time for the gloves to come off, the U.S. government said on Thursday in a newly aggressive policy on cybersecurity...
Digital Trust Digest: This Week’s Must-Know News
Digital Trust Digest: This Week’s Must-Know NewsThe Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here's what happened the week of...
Exposing the “PDF Botnet” – An OSINT Analysis
Exposing the "PDF Botnet" – An OSINT Analysis Dear blog readers, I've recently stumbled upon a pretty interesting and worth mentioning malicious software and botnet spam...
Randall Munroe’s XKCD ‘Fanservice’
Randall Munroe’s XKCD ‘Fanservice’ via the comic artistry and dry wit of Randall Munroe, resident at XKCD! Permalink The post Randall Munroe’s XKCD ‘Fanservice’ appeared first...
Cowbell Adds Free Cybersecurity Services for Insurance Policy Holders
Cowbell Adds Free Cybersecurity Services for Insurance Policy Holders Cowbell this week added a free 24/7 managed security service for organizations that take out a cyberinsurance...
Defeating Malvertising-Based Phishing Attacks
Defeating Malvertising-Based Phishing Attacks Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to its advertising business, cybercriminals are taking...
Digital Trust & Safety Roundup: Costly chargebacks, dynamically fighting ATO, and social media scam risks
Digital Trust & Safety Roundup: Costly chargebacks, dynamically fighting ATO, and social media scam risksExplore the cost of rising chargebacks, strategies for fighting ATO, and how...
SafeBreach Coverage for US-CERT Alert (AA23-061A) – Royal Ransomware
SafeBreach Coverage for US-CERT Alert (AA23-061A) – Royal RansomwareSafeBreach coverage for US-CERT Alert (AA22-335A) - Cuba Ransomware The post SafeBreach Coverage for US-CERT Alert (AA23-061A) –...
Twitter tells users: Pay up if you want to keep using insecure 2FA
Twitter tells users: Pay up if you want to keep using insecure 2FAIronically, Twitter Blue users will be allowed to keep using the very 2FA process...
GoDaddy admits: Crooks hit us with malware, poisoned customer websites
GoDaddy admits: Crooks hit us with malware, poisoned customer websitesNew report admits that attackers were detected in the network about three months ago, and may have...
Coinbase breached by social engineers, employee data stolen
Coinbase breached by social engineers, employee data stolenAnother day, another "sophisticated" attack. This time, the company has handily included some useful advice along with its mea...
S3 Ep123: Crypto company compromise kerfuffle [Audio + Text]
S3 Ep123: Crypto company compromise kerfuffle [Audio + Text]Latest episode - listen now! Top-notch advice for cybersecurity, both at work and at home.Leer másNaked SecurityLatest episode...
NPM JavaScript packages abused to create scambait links in bulk
NPM JavaScript packages abused to create scambait links in bulkFree spins? Bonus game points? Cheap social media followers? What harm could it possibly do if you...
SaaS Security under NYDFS with Grip SSCP
SaaS Security under NYDFS with Grip SSCPNYDFS regulations have significant implications for companies using SaaS solutions, Grip enables customers to secure SaaS and identities to comply...
Dutch police arrest three cyberextortion suspects who allegedly earned millions
Dutch police arrest three cyberextortion suspects who allegedly earned millionsEver paid hush money to crooks who broke into your network? Wondered how much you can trust...
USENIX Security ’22 – Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu – ‘Shuffle-based Private Set Union: Faster and More Secure’
USENIX Security ’22 – Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu – ‘Shuffle-based Private Set Union: Faster and More Secure’Our thanks to USENIX...
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!Even in Apple's and Google's "walled gardens", there are plenty of 2FA apps...





























