Latest Articles

Cybercrime

Don't become a statistic: Tips to help keep your personal data off the dark web

Don't become a statistic: Tips to help keep your personal data off the dark web

Cybercrime

Don't become a statistic: Tips to help keep your personal data off the dark web

You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it

Phil Muncaster29 Oct 2024


We Live Science

Tony Fadell: Innovating to save our planet | Starmus highlights

Tony Fadell: Innovating to save our planet | Starmus highlights

We Live Science

Tony Fadell: Innovating to save our planet | Starmus highlights

As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts

Editor28 Oct 2024


ESET Research

CloudScout: Evasive Panda scouting cloud services

CloudScout: Evasive Panda scouting cloud services

ESET Research

CloudScout: Evasive Panda scouting cloud services

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services

Anh Ho28 Oct 2024


ESET Research

ESET Research Podcast: CosmicBeetle

ESET Research Podcast: CosmicBeetle

ESET Research

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world

ESET Research24 Oct 2024


ESET Research

Embargo ransomware: Rock’n’Rust

Embargo ransomware: Rock’n’Rust

ESET Research

Embargo ransomware: Rock’n’Rust

Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit

Jan Holman and Tomáš Zvara23 Oct 2024


Scams

Google Voice scams: What are they and how do I avoid them?

Google Voice scams: What are they and how do I avoid them?

Scams

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers

Phil Muncaster21 Oct 2024


Video

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

Video

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year

Editor18 Oct 2024


Video, Kids Online

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

Video, Kids Online

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship

Editor16 Oct 2024


Scams

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Scams

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details

Phil Muncaster15 Oct 2024


Digital Security

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

Digital Security

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry

Imogen Byers14 Oct 2024


Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

GoldenJackal jumps the air gap … twice  – Week in security with Tony Anscombe

Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities

Editor11 Oct 2024


ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms

Jakub Souček and Radek Jizba10 Oct 2024


Apt Activity Report
MDR Protection