Virus Bulletin – building digital armies
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack
How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives
How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives
Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors
Your preparedness to deal with cyberattacks is key for lessening the impact of a successful incident – even in home and small business environments
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.
ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana
ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana
ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana
During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan
During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan
Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10 tips will put you on the right track.
Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10 tips will put you on the right track.
Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10 tips will put you on the right track.
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud
Here’s a story of how an analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat
Here’s a story of how an analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
With passkeys poised for prime time, passwords seem pass?. What are the main benefits of ditching one in favor of the other?
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves
While not a ‘get out of jail free card’ for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident
A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities
A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities
How your voice assistant could do the bidding of a hacker – without you ever hearing a thing
4909 Murphy Canyon Road Suite, 500
San Diego, CA 92123
Store
Company
Support
Newsletter
Technology Solutions You Can Trust Dismiss