Latest Articles

Video

Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe

Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe

Video

Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe

Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023

Editor15 Mar 2024


Video

Threat intelligence explained | Unlocked 403 cybersecurity podcast (ep. 2)

Threat intelligence explained | Unlocked 403 cybersecurity podcast (ep. 2)

Video

Threat intelligence explained | Unlocked 403 cybersecurity podcast (ep. 2)

We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats

Editor14 Mar 2024


How To

How to share sensitive files securely online

How to share sensitive files securely online

How To

How to share sensitive files securely online

Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe

Phil Muncaster13 Mar 2024


Critical Infrastructure

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure

Election cybersecurity: Protecting the ballot box and building trust in election integrity

What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?

Phil Muncaster12 Mar 2024


Video

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

Video

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor

Editor08 Mar 2024


ESET Research

Evasive Panda leverages Monlam Festival to target Tibetans

Evasive Panda leverages Monlam Festival to target Tibetans

ESET Research

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers uncover strategic web compromise and supply-chain attacks targeting Tibetans

Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé07 Mar 2024


Scams

Top 10 scams targeting seniors – and how to keep your money safe

Top 10 scams targeting seniors – and how to keep your money safe

Scams

Top 10 scams targeting seniors – and how to keep your money safe

The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud.

Phil Muncaster06 Mar 2024


We Live Progress

Irresistible: Hooks, habits and why you can’t put down your phone

Irresistible: Hooks, habits and why you can’t put down your phone

We Live Progress

Irresistible: Hooks, habits and why you can’t put down your phone

Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices.

Imogen Byers05 Mar 2024


Video

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

Video

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year

Editor01 Mar 2024


Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Business Security, Secure Coding

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

David González Cuautle29 Feb 2024


Business Security

Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

Business Security

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk

Márk Szabó28 Feb 2024


Social Media

10 things to avoid posting on social media – and why

10 things to avoid posting on social media – and why

Social Media

10 things to avoid posting on social media – and why

Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.

Phil Muncaster26 Feb 2024


Apt Activity Report
MDR Protection