Information

This month in security with Tony Anscombe – March 2025 edition

From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it’s a wrap on another month filled with impactful cybersecurity news 31 Mar 2025 As you might expect, the world of cybersecurity doesn’t sleep, so much so that keeping up with new threats and other impactful news actually feels like a full-time job. This is where our roundup of the month’s most impactful cybersecurity stories comes in. In the…

Read More

Resilience in the face of ransomware: A key to business survival

Business Security Ransomware Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage Tomáš Foltýn 31 Mar 2025  •  , 3 min. read “Everybody has a plan until they get punched in the mouth.”  Mike Tyson’s punchy (pun intended) adage rings all too true for organizations reeling from a ransomware attack. In recent years, ransomware has proven capable of bringing even a thriving business to its knees in a matter of…

Read More

The good, the bad and the unknown of AI: A Q&A with Mária Bieliková

Artificial intelligence is on everybody’s lips these days, sparking excitement, fear and endless debates. Is it a force for good or bad – or a force we actually have yet to fully understand? We sat down with prominent computer scientist and AI researcher Mária Bieliková to discuss these and other pressing issues surrounding AI, its impact on humanity, and broader ethical dilemmas and questions of trust it raises. Congratulations on becoming the latest laureate of…

Read More

So your friend has been hacked: Could you be next?

Digital Security When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe. Tomáš Foltýn 09 Apr 2025  •  , 4 min. read News that someone close, be it a friend, relative, or colleague, has had one of their valuable online accounts compromised is bound to trigger a mix of reactions. Concern for them comes first, naturally. But not…

Read More

Watch out for these traps lurking in search results

Digital Security Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results Tomáš Foltýn 10 Apr 2025  •  , 4 min. read When was the last time you searched for something using Google Search, Bing or another gateway to the endless expanse of the internet? What a silly question, right? It may have been just moments ago and perhaps it’s even how you landed…

Read More

1 billion reasons to protect your identity online

Digital Security Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t. Phil Muncaster 08 Apr 2025  •  , 5 min. read Data breaches are a growing threat to companies and a nightmare for their customers. According to the latest figures, 2024 witnessed 3,158 publicly reported incidents in the US –…

Read More

China-based SMS Phishing Triad Pivots to Banks

China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “Smishing Triad” mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime infrastructure and support staff. An image of an iPhone device farm shared on Telegram by one of the Smishing Triad…

Read More

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work. Ignacio Pérez 20 Oct 2014  •  , 3 min. read As promised in our post about the European Cyber Security Month…

Read More

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that’s evolved into a sophisticated threat with a modular architecture. Robert Lipovsky 22 Sep 2014  •  , 5 min. read A large number of state organizations and private businesses from various industry sectors in Ukraine and Poland have been targeted in recent attacks using malware designed for network discovery and remote code execution,…

Read More

Myths about malware: an exploit is the same as malware

In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about. Camilo Gutiérrez Amaya 21 Oct 2014  •  , 2 min. read Continuing with our support to the European Cyber Security Month, we are publishing…

Read More