As ransomware rages on, no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”.
As the number of softwarevulnerabilities continues to increase, delaying or skipping security updates could cost your ...
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a ...
Some Minecraft “hacks” don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
Never rely on just a password, however strong it may be. This October, make it a habit to enable multi-factor authentication ...
IT security is often regarded as the “Department of No” and sometimes it’s easy to see why. In a world of escalating cyber-risk, expanding attack surfaces and a fast-growing cybercrime economy, ...
It’s time to recognize the gravity of cyber risk, put security front and center and, ultimately, turn awareness into action.
Following OceanLotus’ activities is taking a tour in the world of deception. This group is known to lure victims by forging appealing documents to entice potential victims into executing the group’s ...
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous ...