Information

Recruitment red flags: Can you spot a spy posing as a job seeker?

Business Security Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms Phil Muncaster 28 Oct 2025  •  , 5 min. read Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The individual began manipulating and transferring potentially harmful files, and tried to execute unauthorized software. He was subsequently found out to be a North Korean…

Read More

How MDR can give MSPs the edge in a competitive market

Business Security With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs Phil Muncaster 27 Oct 2025  •  , 5 min. read Managed service providers (MSPs) should be in a good place right now. As businesses continue to grow their digital operations, they increasingly need expert partners to help deploy and manage critical IT products and services. Nowhere is this need more pronounced…

Read More

Cybersecurity Awareness Month 2025: When seeing isn’t believing

Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams 29 Oct 2025 Can you tell what’s real online? It’s become increasingly difficult as advances in AI and deepfake technology can help anyone create eerily convincing videos, images, and audio. Scammers waste no time cashing in, using AI-powered media for all manner of scams. For example, they increasingly deploy deepfake versions of well-known…

Read More

This month in security with Tony Anscombe – October 2025 edition

From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October’s headlines offer a glimpse of what’s shaping cybersecurity right now 31 Oct 2025 As October 2025 draws to a close, ESET Chief Security Evangelist Tony Anscombe reviews some of the top cybersecurity stories that made the news over the course of the month and offers insights that they may hold for your own cyber-defenses. Windows 10 reached the…

Read More

Fraud prevention: How to help older family members avoid scams

Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically 30 Oct 2025  •  , 6 min. read When we talk about fraud that can inflict a severe financial and emotional toll on the victims, it’s not hyperbole. One area where this is increasingly evident is elder fraud, as the amounts of money lost to various kinds of online scams climb sharply every year. In 2024 alone, Americans aged…

Read More

Ground zero: 5 things to do after discovering a cyberattack

Business Security When every minute counts, preparation and precision can mean the difference between disruption and disaster Phil Muncaster 03 Nov 2025  •  , 5 min. read Network defenders are feeling the heat. The number of data breaches Verizon investigated last year, as a share of overall incidents, was up 20 percentage points on the previous year. This need not be as catastrophic as it sounds, as long as teams are able to respond rapidly…

Read More

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody

A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to steal tens of millions of dollars from U.S. businesses was arrested in Italy and is now in custody in the United States, KrebsOnSecurity has learned. Sources close to the investigation say Yuriy Igorevich Rybtsov, a 41-year-old from the Russia-controlled city of Donetsk, Ukraine, was previously referenced in U.S. federal charging documents only by his online handle “MrICQ.” According to a 13-year-old…

Read More

Aisuru Botnet Shifts from DDoS to Residential Proxies

Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services that help cybercriminals anonymize their traffic. Experts say a glut of proxies from Aisuru and other sources is fueling large-scale data harvesting efforts tied to various artificial intelligence (AI) projects, helping content scrapers evade…

Read More

Hackers Target Perplexity Comet Browser Users

Shortly after AI search engine company Perplexity launched its Comet AI browser, threat actors attempted to capitalize on it by luring users to fraudulent domains and fake applications, threat intelligence firm BforeAI reports. Launched in July, Comet is a Chromium-based browser that integrates Perplexity’s AI assistant, offering support for automating tasks, organizing emails, and researching the web. Beginning August, BforeAI observed an increase in fraudulent domains promoting an executable version of the browser available for…

Read More

Canada Fines Cybercrime Friendly Cryptomus $176M

Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services. The penalties for violating Canada’s anti money-laundering laws come ten months after KrebsOnSecurity noted that Cryptomus’s Vancouver street address was home to dozens of foreign currency dealers, money transfer businesses, and cryptocurrency exchanges — none of which were physically located there. On October 16, the Financial…

Read More