Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-06-30 09:30:50 |
Costco 40th anniversary scam targets WhatsApp users (lien direct) |
>If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that's because it is
|
|
|
|
|
2022-06-29 09:30:45 |
Do back offices mean backdoors? (lien direct) |
>War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
|
|
|
|
|
2022-06-27 09:30:34 |
5 ways cybercriminals steal credit card details (lien direct) |
>Here are some of the most common ways hackers can get hold of other people's credit card data – and how you can keep yours safe
|
|
|
|
|
2022-06-24 13:00:47 |
Instagram\'s new age verification tool – Week in security with Tony Anscombe (lien direct) |
>As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
|
Tool
|
|
|
|
2022-06-23 09:30:33 |
Virtual private networks: 5 common questions about VPNs answered (lien direct) |
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
|
|
|
|
|
2022-06-21 09:30:07 |
Phishing awareness training: Help your employees avoid the hook (lien direct) |
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
|
|
|
|
|
2022-06-20 09:30:00 |
Crypto mixers: What are they and how are they used? (lien direct) |
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
|
|
|
|
|
2022-06-17 16:00:25 |
How to spot malicious spam – Week in security with Tony Anscombe (lien direct) |
>As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
|
Spam
|
|
|
|
2022-06-16 09:30:53 |
How Emotet is changing tactics in response to Microsoft\'s tightening of Office macro security (lien direct) |
>Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
|
Malware
|
|
|
|
2022-06-13 09:30:14 |
Industroyer: A cyber‑weapon that brought down a power grid (lien direct) |
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
|
Malware
|
|
|
|
2022-06-10 15:00:33 |
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe (lien direct) |
Here are three themes that stood out at the world's largest gathering of cybersecurity professionals
|
|
|
|
|
2022-06-10 14:30:01 |
RSA – APIs, your organization\'s dedicated backdoors (lien direct) |
API-based data transfer is so rapid, there's but little time to stop very bad things happening quickly
|
|
|
|
|
2022-06-09 17:00:21 |
RSA – Creepy real‑world edition (lien direct) |
Digital fiddling somehow got mixed up in a real war
|
|
|
|
|
2022-06-08 18:30:42 |
RSA – Digital healthcare meets security, but does it really want to? (lien direct) |
>Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations' primary mission
|
|
|
|
|
2022-06-07 19:00:02 |
RSA – Spot the real fake (lien direct) |
>How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
|
|
|
|
|
2022-06-07 09:30:01 |
Cybersecurity awareness training: What is it and what works best? (lien direct) |
>Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
|
|
|
|
|
2022-06-03 16:15:16 |
Key insights from ESET\'s latest Threat Report – Week in security with Tony Anscombe (lien direct) |
A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses
|
Threat
|
|
|
|
2022-06-03 16:00:45 |
100 days of war in Ukraine: How the conflict is playing out in cyberspace (lien direct) |
>It's been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict
|
|
|
|
|
2022-06-02 12:00:41 |
(Déjà vu) ESET Threat Report T 1 2022 (lien direct) |
>A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2022-06-01 09:30:59 |
Talking to children about the internet: A kid\'s perspective (lien direct) |
>A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet
|
|
|
|
|
2022-05-30 09:30:02 |
Keeping it real: Don\'t fall for lies about the war (lien direct) |
>Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what's in the fake news
|
|
|
|
|
2022-05-27 13:30:42 |
Scams targeting NFT investors – Week in security with Tony Anscombe (lien direct) |
>As with everything digital, there's someone, somewhere devising a method to steal the assets away from their rightful owners
|
|
|
|
|
2022-05-27 09:30:05 |
Cybersecurity: A global problem that requires a global answer (lien direct) |
>New and exacerbated cyber-risks following Russia's invasion of Ukraine are fueling a new urgency towards enhancing resilience
|
|
|
|
|
2022-05-26 12:00:28 |
ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit (lien direct) |
>Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution
|
Threat
|
|
|
|
2022-05-25 09:30:41 |
5 reasons why GDPR was a milestone for data protection (lien direct) |
>The landmark regulation changed everyone's mindset on how companies worldwide collect and use the personal data of EU citizens
|
|
|
|
|
2022-05-23 09:30:26 |
Common NFT scams and how to avoid them (lien direct) |
>As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry.
|
|
|
|
|
2022-05-20 17:46:18 |
Cryptocurrency: secure or not? – Week in security with Tony Anscombe (lien direct) |
>When you hear the term 'cryptocurrency', does 'secure' also spring to mind? Here are some implications of the lack of sound security practices in the world of crypto.
|
|
|
|
|
2022-05-20 17:01:27 |
Sandworm uses a new version of ArguePatch to attack targets in Ukraine (lien direct) |
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks
|
Malware
|
|
|
|
2022-05-19 09:30:53 |
The flip side of the coin: Why crypto is catnip for criminals (lien direct) |
>Cybercriminals continue to mine for opportunities in the crypto space – here's what you should know about coin-mining hacks and crypto theft
|
Hack
|
|
★★★
|
|
2022-05-18 09:30:18 |
Fake news – why do people believe it? (lien direct) |
>In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real
|
|
|
|
|
2022-05-16 09:30:03 |
The downside of \'debugging\' ransomware (lien direct) |
>The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code
|
Ransomware
|
|
|
|
2022-05-13 13:50:48 |
How to spot and avoid a phishing attack – Week in security with Tony Anscombe (lien direct) |
Can you spot the tell-tale signs of a phishing attempt and check if an email that has landed in your inbox is legit?
|
|
|
|
|
2022-05-12 09:30:30 |
10 reasons why we fall for scams (lien direct) |
The 'it won't happen to me' mindset leaves you unprepared – here are some common factors that put any of us at risk of online fraud
|
|
|
★★
|
|
2022-05-11 09:30:48 |
Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap (lien direct) |
What can organizations do to capitalize on the current fluidity in the job market and bring fresh cybersecurity talent into the fold?
|
|
|
★★
|
|
2022-05-09 09:30:42 |
Common LinkedIn scams: Beware of phishing attacks and fake job offers (lien direct) |
LinkedIn scammers attack when we may be at our most vulnerable – here's what to look out for and how to avoid falling victim to fraud when using the platform
|
|
|
★★
|
|
2022-05-06 14:15:26 |
Defending against APT attacks – Week in security with Tony Anscombe (lien direct) |
The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target organizations' most valuable data
|
Threat
|
|
★★★★
|
|
2022-05-05 09:30:38 |
There\'s no sugarcoating it: That online sugar daddy may be a scammer (lien direct) |
The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud
|
|
|
|
|
2022-05-04 13:00:29 |
3 most dangerous types of Android malware (lien direct) |
Here's what you should know about some of the nastiest mobile malware – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely
|
Malware
|
|
|
|
2022-05-03 09:30:06 |
What\'s behind the record‑high number of zero days? (lien direct) |
Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity
|
|
|
|
|
2022-04-29 14:30:48 |
TA410 under the microscope – Week in security with Tony Anscombe (lien direct) |
Here's what you should know about FlowingFrog, LookingFrog and JollyFrog – the three teams making up the TA410 espionage umbrella group
|
|
|
|
|
2022-04-27 13:00:04 |
A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity (lien direct) |
ESET researchers reveal a detailed profile of TA410: we believe this cyberespionage umbrella group consists of three different teams using different toolsets, including a new version of the FlowCloud espionage backdoor discovered by ESET.
|
|
|
|
|
2022-04-26 09:30:17 |
The trouble with BEC: How to stop the costliest internet scam (lien direct) |
BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It's long past time that organizations got a handle on these scams.
|
|
|
|
|
2022-04-25 09:30:18 |
Webcam hacking: How to know if someone may be spying on you through your webcam (lien direct) |
Camfecting doesn't 'just' invade your privacy – it could seriously impact your mental health and wellbeing. Here's how to keep an eye on your laptop camera.
|
|
|
|
|
2022-04-22 14:00:18 |
Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe (lien direct) |
As the Five Eyes nations warn of attacks against critical infrastructure, we look at the potentially cascading effects of such attacks and how essential systems and services can ramp up their defense
|
|
|
|
|
2022-04-21 09:30:49 |
Critical infrastructure: Under cyberattack for longer than you might think (lien direct) |
Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services
|
|
|
|
|
2022-04-20 15:08:26 |
Is your Lenovo laptop vulnerable to cyberattack? (lien direct) |
Here's what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what you can do right away to stay safe – all in under three minutes
|
|
|
|
|
2022-04-20 13:00:25 |
How can we support young people in harnessing technology for progress? (lien direct) |
Young people are not passive victims of technology or helpless addicts. They are technology creators and agents with diverse backgrounds and interests.
|
|
|
|
|
2022-04-19 09:30:02 |
When “secure” isn\'t secure at all: High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops (lien direct) |
ESET researchers discover multiple vulnerabilities in various Lenovo laptop models that allow an attacker with admin privileges to expose the user to firmware-level malware
|
|
|
|
|
2022-04-13 16:00:11 |
ESET takes part in global operation to disrupt Zloader botnets (lien direct) |
ESET researchers provided technical analysis, statistical information, and known command and control server domain names and IP addresses
|
|
|
|
|
2022-04-12 09:28:16 |
Industroyer2: Industroyer reloaded (lien direct) |
This ICS-capable malware targets a Ukrainian energy company
|
Malware
|
|
|