Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories
Hollywood loves a good thriller—and so do many of us. From Fatal Attraction to You , stalking is a recurring theme that keeps viewers glued to their screens. One of the latest installments in this genre, Netflix’s Baby Reindeer , pulls...
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.
You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts
If you thought the surface web was the whole internet, think again. The dark web is where things get really strange—and sometimes dangerous. It's filled with underground websites that aren't indexed by search engines, and that’s where...
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year
Welcome, humans and ghouls! It’s your old pal, the Vault Keeper, sneaking into the Avast Security News Team’s office after hours to pull together five uncanny stories filled with deception and dread.
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online and even be the start of a predatory relationship
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities
AI has been quite the hot topic this year. It’s no wonder there’s been a lot of discussion , not just about its futuristic potential, but about its impact on the elections.
With elections around the corner, it’s important to stay sharp about when it comes to your political donations. Scammers are taking advantage of the election season , and—as AI continues to advance—it’s becoming trickier to distinguish...
ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms
Voting for the first time? It’s a big deal, but it doesn’t have to be complicated. Whether you're excited or just trying to get through it, there are a few things you’ll want to know—not just about casting your vote, but also about...
ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia
Many have received that email before—the one were the scammer claims to have footage of you in “compromising situations” and you need to pay up to avoid being exposed. However, not everyone has received such an email with images of their...
As a 20-year-old college student, I was always looking to make fast cash. During my junior year of college, the holiday season was upon us, and my part-time job was barely covering the fee to fill up my gas tank. As I looked through my...
How do analyst relations professionals 'sort through the noise' and help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help
New transitions sometimes bring new schools and friends. Enter middle school. Tweens are constantly navigating digital dilemmas. As your middle schooler becomes a more confident internet user, it’s important to continue having...
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams
Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options
The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure