Latest Articles

Cybercrime

Man charged with hacking major US sports leagues to illegally stream games

Man charged with hacking major US sports leagues to illegally stream games

Cybercrime

Man charged with hacking major US sports leagues to illegally stream games

On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000

Amer Owaida02 Nov 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR

Editor29 Oct 2021


Kids Online

5 tips for parents for a cybersecure Halloween

5 tips for parents for a cybersecure Halloween

Kids Online

5 tips for parents for a cybersecure Halloween

What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet?

Amer Owaida28 Oct 2021


Cybercrime

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

Cybercrime

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

The police sting spanned three continents and involved crackdowns in nine countries

Amer Owaida27 Oct 2021


ESET Research

Wslink: Unique and undocumented malicious loader that runs as a server

Wslink: Unique and undocumented malicious loader that runs as a server

ESET Research

Wslink: Unique and undocumented malicious loader that runs as a server

There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor

Vladislav Hrčka27 Oct 2021


Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Putting cybersecurity first: Why secure-by-design must be the norm

Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom

Phil Muncaster26 Oct 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT

Editor22 Oct 2021


Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

What’s lurking in the shadows? How to manage the security risks of shadow IT

Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era

Phil Muncaster22 Oct 2021


How To

Cybersecurity careers: What to know and how to get started

Cybersecurity careers: What to know and how to get started

How To

Cybersecurity careers: What to know and how to get started

Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track.

Editor21 Oct 2021


Privacy

Brave browser replaces Google with its own search engine

Brave browser replaces Google with its own search engine

Privacy

Brave browser replaces Google with its own search engine

Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon

Amer Owaida20 Oct 2021


Ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

Ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds

Amer Owaida19 Oct 2021


How To

A recipe for failure: Predictably poor passwords

A recipe for failure: Predictably poor passwords

How To

A recipe for failure: Predictably poor passwords

Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff.

Jake Moore19 Oct 2021


Apt Activity Report
MDR Protection