Cyber Security

0 Comments
The recent spike in Emotet activity shows that it remains an active threat A week after adding a new email content harvesting module, and following a period of low activity, the malicious actors behind Emotet have launched a new, large-scale spam campaign. What is Emotet? Emotet is a banking Trojan family notorious for its modular
0 Comments
Prevention is the best option but people continue to search for the easiest way out When you work in IT and you’re at a dinner party and somebody asks, ‘What do you do?’ you can usually see the blood run from their face as they’re like, “Oh my God, why me? My one night out this
0 Comments
Celebrated annually on November 3, Antimalware Day is an opportunity to recognize the work of cybersecurity professionals Since 2017, November 3 has been celebrated as Antimalware Day. Established by ESET, Antimalware Day aims to honor the work done by researchers in the field of information security and in the technology industry as a whole. As
0 Comments
Ransomware remains a serious threat and this new white paper explains what enterprises need to know, and do, to reduce risk Throughout 2018 criminals have continued to target large organizations with ransomware. Today we introduce a new white paper that explains why ransomware is still a serious threat to your organization – regardless of size
0 Comments
Proper preparation can make all the difference when it comes to speaking at conferences I promised some further thoughts on making the presentation process more comfortable: it seems to me that (in general) the more comfortable the speaker, the better the experience for the listener. And for most of us, the key to a comfortable
0 Comments
Customers see their admin credentials stolen and their servers infected with Linux/ChachaDDoS In recent months, numerous users of VestaCP, a hosting control panel solution, have received warnings from their service providers that their servers were using an abnormal amount of bandwidth. We know now that these servers were in fact used to launch DDoS attacks. Analysis
0 Comments
What are the emotional triggers and errors in judgment that make you fall for an online scam? Con artists have been plying their trade since time immemorial, but the internet opened the floodgates to a whole new level of fraud. It has allowed fraudsters to take aim at an endless number of victims and at
0 Comments
ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks Recent ESET research has uncovered details of the successor of the BlackEnergy APT group, whose main toolset was last seen in December 2015 during the first-ever blackout caused by a cyberattack. Around the time
0 Comments
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things Several global book publishing houses and an international literary scouting agency have warned their staff of a flurry of phishing emails that seek authors’ and publishers’ sensitive information, including book manuscripts, The Bookseller reports. Penguin Random
0 Comments
The times they are a-changin‘, so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution? With digital transformation moving apace, hardly any aspect of our lives is spared the dramatic effects of lightning-fast technological advances. The workplace is no exception, as the ubiquity of
0 Comments
ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven Among the most significant malware-induced cybersecurity incidents in recent years were the attacks against the Ukrainian power grid
0 Comments
The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets California has passed a piece of legislation that bans weak default passwords on internet-connected devices sold in the region. Under the “Information privacy: connected devices” bill – which is the first Internet-of-Things (IoT)
0 Comments
A closer look at the technology that is rapidly growing in popularity Blockchain is generally associated with Bitcoin and other cryptocurrencies, but these are just the tip of the iceberg.  This technology was originally conceived in 1991, when Stuart Haber and W. Scott Stornetta described their first work on a chain of cryptographically secured blocks, but only gained notoriety in