Information

Scams to look out for this holiday season

As the mercury starts to dip and the Halloween decorations are cleared away, it can mean only one thing: the countdown to Christmas has begun. But the festive season – or Golden Quarter if you’re a retailer – is not just a boon for online stores. It’s also a time of plenty for digital thieves and con artists. To make sure you’re not their next victim, it pays to understand what holiday season scams look…

Read More

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

WeLiveScience ESET’s CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital threats in their tracks 02 Dec 2024 The digital world is a vibrant and fast-paced ecosystem, fueled by immense computational power, vast amounts of data, and boundless possibilities for innovation. Alongside these opportunities, however, lies a darker side – it is also a space fraught with risk. From malware creators, scammers and cybercriminals to…

Read More

Firefox and Windows zero days chained to deliver the RomCom backdoor

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds 26 Nov 2024 ESET researchers have uncovered two previously unknown vulnerabilities in several Mozilla products and in Windows, with both flaws under active exploitation by RomCom, a Russia-aligned group known for opportunistic campaigns against selected business verticals and targeted espionage operations alike. CVE-2024-9680 is a use-after-free bug that allows vulnerable versions of Firefox, Thunderbird, and the Tor…

Read More

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats 27 Nov 2024 ESET researchers have uncovered the first UEFI bootkit designed specifically for Linux systems. The discovery of the bootkit – which has been named Bootkitty by its creators – signals a shift on the UEFI threat landscape. While Bootkitty is only thought to be a proof of concept and has…

Read More

Month in security with Tony Anscombe – November 2024 edition

Zero days under attack, a new advisory from ‘Five Eyes’, thousands of ICS units left exposed, and mandatory MFA for all – it’s a wrap on another month filled with impactful cybersecurity news 29 Nov 2024 As you might expect, the world of cybersecurity continues to evolve at breakneck speed, so much so that keeping up with new threats, scams and data breaches is no mean feat. November 2024 saw no shortage of impactful cybersecurity…

Read More

Achieving cybersecurity compliance in 5 steps

Business Security Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements Márk Szabó 03 Dec 2024  •  , 6 min. read We’ve all been there – creating short- or long-term plans to achieve certain personal goals. However, business planning often comes with even higher stakes, and the consequences of an ill-thought-out plan can be far-reaching and span monetary…

Read More

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Mobile Security Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost Phil Muncaster 09 Dec 2024  •  , 5 min. read The modern smartphone has become an indispensable piece of technology. These powerful, pocket-sized computers enable us to do everything from hailing cabs to consulting with our local doctor. But costs can be prohibitive. Unsurprisingly, second-hand…

Read More

Philip Torr: AI to the people | Starmus highlights

WeLiveScience We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact 05 Dec 2024 What kind of change will the AI revolution bring? Will artificial intelligence be a force for good or a tool for harm? That’s up to us. In his expansive talk, researcher in machine learning and computer vision Philipp Torr explores vital questions about the impact of…

Read More

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

Video Business Security As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s rapidly evolving threats? 10 Dec 2024 In this episode of Unlocked 403, Becks is joined by Michal Jankech, Vice-president for Enterprise and SMB/MSP at ESET, to discuss one of the most pressing questions businesses need to ask themselves these days: can our cybersecurity strategy keep up with today’s rapidly evolving threats? Together,…

Read More

Black Hat Europe 2024: Can AI systems be socially engineered?

Digital Security Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? Tony Anscombe 12 Dec 2024  •  , 3 min. read When interacting with chatbots and other AI-powered tools, we typically ask them simple questions like, “What’s the weather going to be today?” or “Will the trains be running on time?”. Those not involved in the development of AI probably assume that all data is poured…

Read More