Latest Articles

Ukraine Crisis – Digital Security Resource Center

Fake news – why do people believe it?

Fake news – why do people believe it?

Ukraine Crisis – Digital Security Resource Center

Fake news – why do people believe it?

In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real

André Lameiras18 May 2022


Video

How to spot and avoid a phishing attack – Week in security with Tony Anscombe

How to spot and avoid a phishing attack – Week in security with Tony Anscombe

Video

How to spot and avoid a phishing attack – Week in security with Tony Anscombe

Can you spot the tell-tale signs of a phishing attempt and check if an email that has landed in your inbox is legit?

Editor13 May 2022


Scams

10 reasons why we fall for scams

10 reasons why we fall for scams

Scams

10 reasons why we fall for scams

The ‘it won’t happen to me’ mindset leaves you unprepared – here are some common factors that put any of us at risk of online fraud

André Lameiras12 May 2022


We Live Progress, Business Security

Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap

Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap

We Live Progress, Business Security

Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap

What can organizations do to capitalize on the current fluidity in the job market in order to bring fresh cybersecurity talent into the fold?

Phil Muncaster11 May 2022


Scams

Common LinkedIn scams: Beware of phishing attacks and fake job offers

Common LinkedIn scams: Beware of phishing attacks and fake job offers

Scams

Common LinkedIn scams: Beware of phishing attacks and fake job offers

LinkedIn scammers attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform

André Lameiras09 May 2022


Video

Defending against APT attacks – Week in security with Tony Anscombe

Defending against APT attacks – Week in security with Tony Anscombe

Video

Defending against APT attacks – Week in security with Tony Anscombe

The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target organizations' most valuable data

Editor06 May 2022


Scams

There’s no sugarcoating it: That online sugar daddy may be a scammer

There’s no sugarcoating it: That online sugar daddy may be a scammer

Scams

There’s no sugarcoating it: That online sugar daddy may be a scammer

The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud

Phil Muncaster05 May 2022


Mobile Security

3 most dangerous types of Android malware

3 most dangerous types of Android malware

Mobile Security

3 most dangerous types of Android malware

Here's what you should know about some of the nastiest mobile malware around – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely

Lukas Stefanko04 May 2022


Business Security

What’s behind the record-high number of zero days?

What’s behind the record-high number of zero days?

Business Security

What’s behind the record-high number of zero days?

Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity

Phil Muncaster03 May 2022


Video

TA410 under the microscope – Week in security with Tony Anscombe

TA410 under the microscope – Week in security with Tony Anscombe

Video

TA410 under the microscope – Week in security with Tony Anscombe

Here's what you should know about FlowingFrog, LookingFrog and JollyFrog, the three teams making up the TA410 espionage umbrella group

Editor29 Apr 2022


ESET Research

A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity

A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity

ESET Research

A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity

ESET researchers reveal a detailed profile of TA410: we believe this cyberespionage umbrella group consists of three different teams using different toolsets, including a new version of the FlowCloud espionage backdoor discovered by ESET.

Alexandre Côté Cyr and Matthieu Faou27 Apr 2022


Scams

BEC: What to know about – and how to stop – the costliest internet scam

BEC: What to know about – and how to stop – the costliest internet scam

Scams

BEC: What to know about – and how to stop – the costliest internet scam

BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It’s long past time that organizations got a handle on these scams.

Phil Muncaster26 Apr 2022


Apt Activity Report
MDR Protection