Latest Articles

Video

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

Video

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause

Editor17 Nov 2023


Social Media

Is your LinkedIn profile revealing too much?

Is your LinkedIn profile revealing too much?

Social Media

Is your LinkedIn profile revealing too much?

How much contact and personal information do you give away in your LinkedIn profile and who can see it? Here’s why less may be more.

Daniel Cunha Barbosa16 Nov 2023


We Live Progress

Level up! These games will make learning about cybersecurity fun

Level up! These games will make learning about cybersecurity fun

We Live Progress

Level up! These games will make learning about cybersecurity fun

Discover six games that will provide valuable knowledge while turning learning about digital security into an enjoyable and rewarding adventure

Luiza Pires14 Nov 2023


Secure Coding

Capture the flag: 5 websites to sharpen your hacking skills

Capture the flag: 5 websites to sharpen your hacking skills

Secure Coding

Capture the flag: 5 websites to sharpen your hacking skills

Through engaging hacking challenges and competitions, CTFs offer an excellent opportunity to test and enhance your security and problem-solving skills

Christian Ali Bravo13 Nov 2023


Video

Spyware disguised as a news app – Week in security with Tony Anscombe

Spyware disguised as a news app – Week in security with Tony Anscombe

Video

Spyware disguised as a news app – Week in security with Tony Anscombe

The Urdu version of the Hunza News website offers readers the option to download an Android app – little do they know that the app is actually spyware

Editor10 Nov 2023


Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk

Phil Muncaster10 Nov 2023


ESET Research

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan

ESET Research

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan

ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News

Lukas Stefanko09 Nov 2023


Business Security

Navigating the security and privacy challenges of large language models

Navigating the security and privacy challenges of large language models

Business Security

Navigating the security and privacy challenges of large language models

Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technology’s business value

Phil Muncaster06 Nov 2023


Video

The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe

The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe

Video

The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe

Various questions linger following the botnet's sudden and deliberate demise, including: who actually initiated it?

Editor03 Nov 2023


ESET Research

Who killed Mozi? Finally putting the IoT zombie botnet in its grave

Who killed Mozi? Finally putting the IoT zombie botnet in its grave

ESET Research

Who killed Mozi? Finally putting the IoT zombie botnet in its grave

How ESET Research found a kill switch that had been used to take down one of the most prolific botnets out there

Ivan Bešina, Michal Škuta, Miloš Čermák01 Nov 2023


We Live Progress

Closing the gender gap: 7 ways to attract more women into cybersecurity

Closing the gender gap: 7 ways to attract more women into cybersecurity

We Live Progress

Closing the gender gap: 7 ways to attract more women into cybersecurity

Global Diversity Awareness Month is a timely occasion to reflect on the steps required to remove obstacles to women's participation in the security industry and to consider the value of diversity in the security workforce

Editor31 Oct 2023


Digital Security

20 scary cybersecurity facts and figures for a haunting Halloween

20 scary cybersecurity facts and figures for a haunting Halloween

Digital Security

20 scary cybersecurity facts and figures for a haunting Halloween

Cybersecurity Awareness Month draws to a close and Halloween is just around the corner, so here is a bunch of spine-tingling figures about some very real tricks and threats lurking online

Phil Muncaster30 Oct 2023


Apt Activity Report
MDR Protection