Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks⦠Sounds like the infamous Turla? Think again!
Gamers and cybersecurity professionals have something in common β the ever-terrible presence of hacking, scams, and data theft β but how and why would anyone want to target gamers?
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?
With powerful AI, it doesnβt take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
As TikTok CEO attempts to placate U.S. lawmakers, itβs time for us all to think about the wealth of personal information that TikTok and other social media giants collect about us
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew of NSFW content and privacy threats
Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp β and what you can do to protect yourself against them.
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured
As all things (wrongly called) AI take the worldβs biggest security event by storm, we round up of some of their most-touted use cases and applications
An astrobiologist, analog astronaut, author and speaker, Dr. Michaela Musilova shares her experience as a woman at the forefront of space exploration and from her quest for scientific and personal excellence
ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Twitterβs ditching of free text-message authentication doesnβt mean that you should forgo using 2FA. Instead, switch to another β and, indeed, better β 2FA option.
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves