Latest Articles

Video

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

Video

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated

Editor28 Apr 2023


Digital Security

RSA Conference 2023: How AI will infiltrate the world

RSA Conference 2023: How AI will infiltrate the world

Digital Security

RSA Conference 2023: How AI will infiltrate the world

As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications

Cameron Camp26 Apr 2023


ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software

Facundo Muñoz26 Apr 2023


Video

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

Video

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks

Editor21 Apr 2023


ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

Peter Kálnai and Marc-Etienne M.Léveillé20 Apr 2023


Critical Infrastructure, Business Security

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

Critical Infrastructure, Business Security

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents

Márk Szabó19 Apr 2023


How To

PC running slow? 10 ways you can speed it up

PC running slow? 10 ways you can speed it up

How To

PC running slow? 10 ways you can speed it up

Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way.

André Lameiras19 Apr 2023


ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

Discarded, not destroyed: Old routers reveal corporate secrets

ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'

Cameron Camp and Tony Anscombe18 Apr 2023


Video

Hunting down BlackLotus – Week in security with Tony Anscombe

Hunting down BlackLotus – Week in security with Tony Anscombe

Video

Hunting down BlackLotus – Week in security with Tony Anscombe

Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers

Editor14 Apr 2023


Digital Security

Safety first: 5 cybersecurity tips for freelance bloggers

Safety first: 5 cybersecurity tips for freelance bloggers

Digital Security

Safety first: 5 cybersecurity tips for freelance bloggers

The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?

Márk Szabó14 Apr 2023


Business Security

What are the cybersecurity concerns of SMBs by sector?

What are the cybersecurity concerns of SMBs by sector?

Business Security

What are the cybersecurity concerns of SMBs by sector?

Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured

Editor12 Apr 2023


How To

10 things to look out for when buying a password manager

10 things to look out for when buying a password manager

How To

10 things to look out for when buying a password manager

Here's how to choose the right password vault for you and what exactly to consider when weighing your options

Phil Muncaster11 Apr 2023


Apt Activity Report
MDR Protection