While it may be too late to introduce wholesale changes to your security policies, it doesnβt hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them
The holiday shopping season may be the time to splurge, but itβs a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats
ESET's research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online
AI-driven voice cloning can make things far too easy for scammers β I know because Iβve tested it so that you donβt have to learn about the risks the hard way.
An attack against a port operator that ultimately hobbled some 40 percent of Australiaβs import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause
The Urdu version of the Hunza News website offers readers the option to download an Android app β little do they know that the app is actually spyware
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk
Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technologyβs business value
Global Diversity Awareness Month is a timely occasion to reflect on the steps required to remove obstacles to women's participation in the security industry and to consider the value of diversity in the security workforce
Cybersecurity Awareness Month draws to a close and Halloween is just around the corner, so here is a bunch of spine-tingling figures about some very real tricks and threats lurking online
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. Whatβs the trade-off?
ESET's analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victimβs machine
One of the biggest threats to watch out for on social media is fraud perpetrated by people who arenβt who they claim to be. Hereβs how to recognize them.
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being
While far from all roles in security explicitly demand coding skills, itβs challenging to envision a career in this field that wouldnβt derive substantial advantages from at least a basic understanding of fundamental coding principles
Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?
Once youβve made it past the initial screening process and secured that all-important interview, itβs time to seal the deal. These 10 tips will put you on the right track.
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States
Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as βthe front page of the Internetβ?
The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured
Phishing emails are a weapon of choice for criminals intent on stealing peopleβs personal data and planting malware on their devices. The healing process does not end with antivirus scanning.
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend β but is it a true VPN service? The devil is in the details.
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs