Latest Articles

Video

UEFI Secure Boot: Not so secure

UEFI Secure Boot: Not so secure

Video

UEFI Secure Boot: Not so secure

ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems

Editor16 Jan 2025


ESET Research

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

ESET Research

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

The story of a signed UEFI application allowing a UEFI Secure Boot bypass

Martin Smolár16 Jan 2025


Digital Security

Cybersecurity and AI: What does 2025 have in store?

Cybersecurity and AI: What does 2025 have in store?

Digital Security

Cybersecurity and AI: What does 2025 have in store?

In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats

Phil Muncaster15 Jan 2025


Kids Online

Protecting children online: Where Florida’s new law falls short

Protecting children online: Where Florida’s new law falls short

Kids Online

Protecting children online: Where Florida’s new law falls short

Some of the state’s new child safety law can be easily circumvented. Should it have gone further?

Tony Anscombe14 Jan 2025


Digital Security

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Digital Security

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe

Phil Muncaster09 Jan 2025


Business Security

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

Business Security

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats

Phil Muncaster07 Jan 2025


Digital Security

AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

Digital Security

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.

Cameron Camp06 Jan 2025


We Live Science

Gary Marcus – Taming Silicon Valley | Starmus Highlights

Gary Marcus – Taming Silicon Valley | Starmus Highlights

We Live Science

Gary Marcus – Taming Silicon Valley | Starmus Highlights

The prominent AI researcher explores the societal impact of artificial intelligence and outlines his vision for a future in which AI upholds human rights, dignity, and fairness

Editor03 Jan 2025


Video

This month in security with Tony Anscombe – December 2024 edition

This month in security with Tony Anscombe – December 2024 edition

Video

This month in security with Tony Anscombe – December 2024 edition

From attacks leveraging new new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity news

Editor27 Dec 2024


We Live Science

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights

We Live Science

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights

The first Canadian to walk in space dives deep into the origins of space debris, how it’s become a growing problem, and how we can clean up the orbital mess

Editor23 Dec 2024


ESET Research

ESET Research Podcast: Telekopye, again

ESET Research Podcast: Telekopye, again

ESET Research

ESET Research Podcast: Telekopye, again

Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of 'Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call 'Mammoths'

ESET Research20 Dec 2024


Video

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)

Video

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)

ESET's Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud

Editor19 Dec 2024


Apt Activity Report
MDR Protection