Information

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats 27 Nov 2024 ESET researchers have uncovered the first UEFI bootkit designed specifically for Linux systems. The discovery of the bootkit – which has been named Bootkitty by its creators – signals a shift on the UEFI threat landscape. While Bootkitty is only thought to be a proof of concept and has…

Read More

Month in security with Tony Anscombe – November 2024 edition

Zero days under attack, a new advisory from ‘Five Eyes’, thousands of ICS units left exposed, and mandatory MFA for all – it’s a wrap on another month filled with impactful cybersecurity news 29 Nov 2024 As you might expect, the world of cybersecurity continues to evolve at breakneck speed, so much so that keeping up with new threats, scams and data breaches is no mean feat. November 2024 saw no shortage of impactful cybersecurity…

Read More

Achieving cybersecurity compliance in 5 steps

Business Security Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements Márk Szabó 03 Dec 2024  •  , 6 min. read We’ve all been there – creating short- or long-term plans to achieve certain personal goals. However, business planning often comes with even higher stakes, and the consequences of an ill-thought-out plan can be far-reaching and span monetary…

Read More

Philip Torr: AI to the people | Starmus highlights

WeLiveScience We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact 05 Dec 2024 What kind of change will the AI revolution bring? Will artificial intelligence be a force for good or a tool for harm? That’s up to us. In his expansive talk, researcher in machine learning and computer vision Philipp Torr explores vital questions about the impact of…

Read More

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Mobile Security Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost Phil Muncaster 09 Dec 2024  •  , 5 min. read The modern smartphone has become an indispensable piece of technology. These powerful, pocket-sized computers enable us to do everything from hailing cabs to consulting with our local doctor. But costs can be prohibitive. Unsurprisingly, second-hand…

Read More

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

Video Business Security As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s rapidly evolving threats? 10 Dec 2024 In this episode of Unlocked 403, Becks is joined by Michal Jankech, Vice-president for Enterprise and SMB/MSP at ESET, to discuss one of the most pressing questions businesses need to ask themselves these days: can our cybersecurity strategy keep up with today’s rapidly evolving threats? Together,…

Read More

Black Hat Europe 2024: Can AI systems be socially engineered?

Digital Security Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? Tony Anscombe 12 Dec 2024  •  , 3 min. read When interacting with chatbots and other AI-powered tools, we typically ask them simple questions like, “What’s the weather going to be today?” or “Will the trains be running on time?”. Those not involved in the development of AI probably assume that all data is poured…

Read More

ESET Threat Report H2 2024

ESET Research Threat Reports A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Jiří Kropáč 16 Dec 2024  •  , 3 min. read In the usual cat-and-mouse game with defenders, the second half of 2024 has seen the cybercriminals keeping busy, finding security loopholes and innovative ways to expand their victim pool. As a result, we’ve seen new attack vectors…

Read More

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization

Digital Security Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems Tony Anscombe 13 Dec 2024  •  , 3 min. read Mention vulnerability and patch management to a cybersecurity team and they all have the same dismayed look of fatigue and exhaustion. The CVE database continues to grow at a considerable pace,…

Read More

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned. Security experts say the Russia-based service provider Prospero OOO (the triple O is the Russian version of “LLC”) has long been a persistent source of malicious software, botnet controllers, and a torrent of phishing websites. Last year, the French security firm Intrinsec…

Read More