CyberSecurity Updates

Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures 24 Oct 2025 In the remote and hybrid work era, employee use of unsanctioned hardware and software (known as shadow IT) has become an acute problem that results in security gaps along with potential data loss and compliance issues. The stakes grow further as employees increasingly use generative AI tools for productivity and convenience while their employers lose…

Read More

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead 04 Nov 2025 Why do people fall for scams even when they should know better? It’s a question that says more about human nature than about technology. In this episode of Unlocked 403, Becks is joined by Alena Košinárová, a software engineer at ESET…

Read More

How MDR can give MSPs the edge in a competitive market

Business Security With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs Phil Muncaster 27 Oct 2025  •  , 5 min. read Managed service providers (MSPs) should be in a good place right now. As businesses continue to grow their digital operations, they increasingly need expert partners to help deploy and manage critical IT products and services. Nowhere is this need more pronounced…

Read More

Recruitment red flags: Can you spot a spy posing as a job seeker?

Business Security Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms Phil Muncaster 28 Oct 2025  •  , 5 min. read Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The individual began manipulating and transferring potentially harmful files, and tried to execute unauthorized software. He was subsequently found out to be a North Korean…

Read More

Cybersecurity Awareness Month 2025: When seeing isn’t believing

Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams 29 Oct 2025 Can you tell what’s real online? It’s become increasingly difficult as advances in AI and deepfake technology can help anyone create eerily convincing videos, images, and audio. Scammers waste no time cashing in, using AI-powered media for all manner of scams. For example, they increasingly deploy deepfake versions of well-known…

Read More

Fraud prevention: How to help older family members avoid scams

Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically 30 Oct 2025  •  , 6 min. read When we talk about fraud that can inflict a severe financial and emotional toll on the victims, it’s not hyperbole. One area where this is increasingly evident is elder fraud, as the amounts of money lost to various kinds of online scams climb sharply every year. In 2024 alone, Americans aged…

Read More

This month in security with Tony Anscombe – October 2025 edition

From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October’s headlines offer a glimpse of what’s shaping cybersecurity right now 31 Oct 2025 As October 2025 draws to a close, ESET Chief Security Evangelist Tony Anscombe reviews some of the top cybersecurity stories that made the news over the course of the month and offers insights that they may hold for your own cyber-defenses. Windows 10 reached the…

Read More

Ground zero: 5 things to do after discovering a cyberattack

Business Security When every minute counts, preparation and precision can mean the difference between disruption and disaster Phil Muncaster 03 Nov 2025  •  , 5 min. read Network defenders are feeling the heat. The number of data breaches Verizon investigated last year, as a share of overall incidents, was up 20 percentage points on the previous year. This need not be as catastrophic as it sounds, as long as teams are able to respond rapidly…

Read More

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody

A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to steal tens of millions of dollars from U.S. businesses was arrested in Italy and is now in custody in the United States, KrebsOnSecurity has learned. Sources close to the investigation say Yuriy Igorevich Rybtsov, a 41-year-old from the Russia-controlled city of Donetsk, Ukraine, was previously referenced in U.S. federal charging documents only by his online handle “MrICQ.” According to a 13-year-old…

Read More

New Guidance Released on Microsoft Exchange Server Security Best Practices

Today, CISA, in partnership with the National Security Agency and international cybersecurity partners, released Microsoft Exchange Server Security Best Practices, a guide to help network defenders harden on-premises Exchange servers against exploitation by malicious actors. Threat activity targeting Exchange continues to persist, and organizations with unprotected or misconfigured Exchange servers remain at high risk of compromise.  Best practices in this guide focus on hardening user authentication and access, ensuring strong network encryption, and minimizing application…

Read More