CyberSecure Specialist

Why shadow AI could be your biggest security blind spot

Business Security From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Phil Muncaster 11 Nov 2025  •  , 5 min. read Shadow IT has long been a thorn in the side of corporate security teams. After all, you can’t manage or protect what you can’t see. But things could be about to get a lot worse. The scale, reach and power of artificial intelligence (AI)…

Read More

Update: Implementation Guidance for Emergency Directive on Cisco ASA and Firepower Device Vulnerabilities

CISA has released Emergency Cisco Directive 25-03 Implementation Guidance to assist federal agencies in addressing critical vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Firepower devices. Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices, issued on Sept. 25, identified known vulnerabilities CVE-2025-20333 and CVE-2025-20362, and mandated immediate action to mitigate risks. Threat actors continue to target these devices, posing significant risk to all organizations.  The implementation guidance provides information on the minimum software versions that…

Read More

This month in security with Tony Anscombe – September 2025 edition

The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans 29 Sep 2025 As September 2025 comes to a close, ESET Chief Security Evangelist Tony Anscombe reviews a selection of the top cybersecurity stories that have made the headlines over the past 30 days and offers insights that they hold for your own cyber-defenses. So what were some of the key…

Read More

Cybersecurity Awareness Month 2025: Knowledge is power

We’re kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals 01 Oct 2025 October is Cybersecurity Awareness Month and what better way to open it than with a reminder that the human element is the first and crucial line of defense against all manner of cyberthreats. Cybercriminals are adept at targeting not just technical flaws, but also take…

Read More

New spyware campaigns target privacy-conscious Android users in the UAE

ESET researchers have uncovered two Android spyware campaigns targeting individuals interested in secure communication apps, namely Signal and ToTok. These campaigns distribute malware through deceptive websites and social engineering and appear to target residents of the United Arab Emirates (UAE). Our investigation led to the discovery of two previously undocumented spyware families – Android/Spy.ProSpy, impersonating upgrades or plugins for the Signal and ToTok messaging apps; and Android/Spy.ToSpy, impersonating the ToTok app. Neither app containing the…

Read More

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Business Security Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging Phil Muncaster 03 Oct 2025  •  , 5 min. read Manufacturers face a unique mix of risk: they have an extremely low tolerance for downtime, they sit at the heart of extensive and often complex supply chains, and their competitive advantage is often built on high-value intellectual property (IP), including proprietary…

Read More

Beware of threats lurking in booby-trapped PDF files

Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money. Fabiana Ramírez Cuenca 06 Oct 2025  •  , 5 min. read PDF files have become a staple of our daily digital lives, both at work and at home. They work seamlessly across operating systems and devices, and they couldn’t be easier to create and share. Every day, countless PDF (Portable Document Format) files are…

Read More

The case for cybersecurity: Why successful businesses are built on protection

Business Security Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center Phil Muncaster 07 Oct 2025  •  , 5 min. read These are nervy times for many business leaders. Persistently high interest rates, geopolitical tensions, supply chain disruption and abrupt changes to trade policies have created a new climate of uncertainty. Against this backdrop, many could be forgiven for stalling investment and looking for…

Read More

Cybersecurity Awareness Month 2025: Passwords alone are not enough

Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders. 08 Oct 2025 October is Cybersecurity Awareness Month, a good time to pause and reflect on how you protect your digital world and your online accounts in particular. For many people, that’s still just a password. But here’s the rub: Passwords alone are not enough to stand up to…

Read More

How Uber seems to know where you are – even with restricted location permissions

Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way. Tony Anscombe 09 Oct 2025  •  , 3 min. read When you land at an airport, you may be greeted with a notification on your phone that reads: “Welcome to [your location] – Open the app to get directions to the Uber pick-up point.” For privacy-conscious users who only allow apps to access their location while…

Read More