FreshRSS

πŸ”’
☐ β˜† βœ‡ WeLiveSecurity

Android GravityRAT goes after WhatsApp backups

June 15th 2023 at 11:30
ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files
☐ β˜† βœ‡ WeLiveSecurity

Cyber insurance: What is it and does my company need it?

June 13th 2023 at 11:30
While not a 'get out of jail free card' for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident
☐ β˜† βœ‡ WeLiveSecurity

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

June 9th 2023 at 14:30
A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities
☐ β˜† βœ‡ WeLiveSecurity

Asylum Ambuscade: crimeware or cyberespionage?

June 8th 2023 at 11:30
A curious case of a threat actor at the border between crimeware and cyberespionage
☐ β˜† βœ‡ WeLiveSecurity

Hear no evil: Ultrasound attacks on voice assistants

June 7th 2023 at 11:30
HowΒ your voice assistant could do the bidding of a hacker – without you ever hearing a thing
☐ β˜† βœ‡ WeLiveSecurity

7 tips for spotting a fake mobile app

June 6th 2023 at 11:30
Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future
☐ β˜† βœ‡ WeLiveSecurity

API security in the spotlight – Week in security with Tony Anscombe

June 2nd 2023 at 14:30
Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.
☐ β˜† βœ‡ WeLiveSecurity

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1st 2023 at 11:30
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
☐ β˜† βœ‡ WeLiveSecurity

5 free OSINT tools for social media

May 31st 2023 at 11:30
A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms
☐ β˜† βœ‡ WeLiveSecurity

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

May 30th 2023 at 11:30
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
☐ β˜† βœ‡ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

May 26th 2023 at 16:15
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
☐ β˜† βœ‡ WeLiveSecurity

Shedding light on AceCryptor and its operation

May 25th 2023 at 11:30
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
☐ β˜† βœ‡ WeLiveSecurity

Digital security for the self-employed: Staying safe without an IT team to help

May 24th 2023 at 11:30
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
☐ β˜† βœ‡ WeLiveSecurity

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

May 23rd 2023 at 11:30
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio
☐ β˜† βœ‡ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

May 19th 2023 at 14:30
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
☐ β˜† βœ‡ WeLiveSecurity

Top 5 search engines for internet-connected devices and services

May 18th 2023 at 11:30
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
☐ β˜† βœ‡ WeLiveSecurity

Meet β€œAI”, your new colleague: could it expose your company's secrets?

May 17th 2023 at 11:30
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
☐ β˜† βœ‡ WeLiveSecurity

You may not care where you download software from, but malware does

May 16th 2023 at 11:30
Why do people still download files from sketchy places and get compromised as a result?
☐ β˜† βœ‡ WeLiveSecurity

Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe

May 12th 2023 at 17:15
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
☐ β˜† βœ‡ WeLiveSecurity

Why you need parental control software – and 5 features to look for

May 12th 2023 at 11:30
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
☐ β˜† βœ‡ WeLiveSecurity

Turning on stealth mode: 5 simple strategies for staying under the radar online

May 10th 2023 at 11:30
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4Β 2022­–Q1 2023

May 9th 2023 at 11:30
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4Β 2022 and Q1Β 2023
☐ β˜† βœ‡ WeLiveSecurity

How the war in Ukraine has been a catalyst in private-public collaborations

May 9th 2023 at 10:00
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
☐ β˜† βœ‡ WeLiveSecurity

APTs target MSP access to customer networks – Week in security with Tony Anscombe

May 5th 2023 at 16:00
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
☐ β˜† βœ‡ WeLiveSecurity

Creating strong, yet user-friendly passwords: Tips for your business password policy

May 4th 2023 at 11:30
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
☐ β˜† βœ‡ WeLiveSecurity

Using Discord? Don’t play down its privacy and security risks

May 3rd 2023 at 11:30
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut
☐ β˜† βœ‡ WeLiveSecurity

APT groups muddying the waters for MSPs

May 2nd 2023 at 11:30
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers
☐ β˜† βœ‡ WeLiveSecurity

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

April 28th 2023 at 16:30
The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated
☐ β˜† βœ‡ WeLiveSecurity

RSA Conference 2023 – How AI will infiltrate the world

April 26th 2023 at 16:30
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
☐ β˜† βœ‡ WeLiveSecurity

Evasive Panda APT group delivers malware via updates for popular Chinese software

April 26th 2023 at 11:30
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
☐ β˜† βœ‡ WeLiveSecurity

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

April 21st 2023 at 12:00
Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks
☐ β˜† βœ‡ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

April 20th 2023 at 11:30
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
☐ β˜† βœ‡ WeLiveSecurity

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

April 19th 2023 at 15:15
The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents
☐ β˜† βœ‡ WeLiveSecurity

PC running slow? 10 ways you can speed it up

April 19th 2023 at 11:30
Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way.
☐ β˜† βœ‡ WeLiveSecurity

Discarded, not destroyed: Old routers reveal corporate secrets

April 18th 2023 at 15:00
When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'
☐ β˜† βœ‡ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

April 14th 2023 at 13:00
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
☐ β˜† βœ‡ WeLiveSecurity

Safety first: 5 cybersecurity tips for freelance bloggers

April 14th 2023 at 11:30
The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?
☐ β˜† βœ‡ WeLiveSecurity

What are the cybersecurity concerns of SMBs by sector?

April 12th 2023 at 11:30
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured
☐ β˜† βœ‡ WeLiveSecurity

10 things to look out for when buying a password manager

April 11th 2023 at 11:30
Here's how to choose the right password vault for you and what exactly to consider when weighing your options
☐ β˜† βœ‡ WeLiveSecurity

Steer clear of tax scams – Week in security with Tony Anscombe

April 6th 2023 at 16:15
In a rush to file your taxes? Watch out for cybercriminals preying on stressed taxpayers as Tax Day looms large on the horizon.
☐ β˜† βœ‡ WeLiveSecurity

Cleaning up your social media and passwords: What to trash and what to treasure

April 6th 2023 at 11:30
Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos
☐ β˜† βœ‡ WeLiveSecurity

Why you should spring clean your home network and audit your backups

April 5th 2023 at 11:30
Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit.
☐ β˜† βœ‡ WeLiveSecurity

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

September 14th 2023 at 14:01
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States
☐ β˜† βœ‡ WeLiveSecurity

Read it right! How to spot scams on Reddit

September 13th 2023 at 09:31
Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as β€œthe front page of the Internet”?
☐ β˜† βœ‡ WeLiveSecurity

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

September 12th 2023 at 09:31
Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
☐ β˜† βœ‡ WeLiveSecurity

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

September 11th 2023 at 09:30
ESET Research uncovers the Sponsoring Access campaign, which utilizes an undocumented Ballistic Bobcat backdoor we have named Sponsor
☐ β˜† βœ‡ WeLiveSecurity

Will you give X your biometric data? – Week in security with Tony Anscombe

September 8th 2023 at 09:22
The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured
☐ β˜† βœ‡ WeLiveSecurity

Staying ahead of threats: 5 cybercrime trends to watch

September 6th 2023 at 09:31
New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought
☐ β˜† βœ‡ WeLiveSecurity

Getting off the hook: 10 steps to take after clicking on a phishing link

September 4th 2023 at 09:30
Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.
☐ β˜† βœ‡ WeLiveSecurity

Fake Signal and Telegram apps – Week in security with Tony Anscombe

August 31st 2023 at 13:10
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites
☐ β˜† βœ‡ WeLiveSecurity

What you need to know about iCloud Private Relay

August 31st 2023 at 09:30
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend β€” but is it a true VPN service? The devil is in the details.
☐ β˜† βœ‡ WeLiveSecurity

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

August 30th 2023 at 09:30
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs
☐ β˜† βœ‡ WeLiveSecurity

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

August 28th 2023 at 09:30
The campaign started with a trojanized version of unsupported financial software
☐ β˜† βœ‡ WeLiveSecurity

How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe

August 25th 2023 at 13:53
ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud people out of their money
☐ β˜† βœ‡ WeLiveSecurity

Telekopye: Hunting Mammoths using Telegram bot

August 24th 2023 at 09:30
Analysis of Telegram bot that helps cybercriminals scam people on online marketplaces
☐ β˜† βœ‡ WeLiveSecurity

Scarabs colon-izing vulnerable servers

August 22nd 2023 at 09:30
Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle
☐ β˜† βœ‡ WeLiveSecurity

A Bard’s Tale – how fake AI bots try to install malware

August 21st 2023 at 09:31
The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what the hype is about. Heydays for cybercriminals!
☐ β˜† βœ‡ WeLiveSecurity

Evacuation of 30,000 hackers – Week in security with Tony Anscombe

August 18th 2023 at 09:54
DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event's venue due to a bomb threat
☐ β˜† βœ‡ WeLiveSecurity

DEF CON 31: US DoD urges hackers to go and hack β€˜AI’

August 18th 2023 at 09:31
The limits of current AI need to be tested before we can rely on their output
☐ β˜† βœ‡ WeLiveSecurity

Mass-spreading campaign targeting Zimbra users

August 17th 2023 at 09:54
ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server.
❌