How regulatory standards and cyber insurance inform each other
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield…
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield…
Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security 23 Aug 2024 ESET researchers have recently…
The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your…
In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors 27 Aug 2024 • , 4 min. read Outdated devices…
The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become 28 Aug 2024 Recently, ESET Researchers…
Sometimes there’s more than just an enticing product offer hiding behind an ad 03 Sep 2024 • , 3 min. read One thing is true:…
Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when…
ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver 05 Sep 2024 • , 1 min. read Usually…
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey…
Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks 11 Sep 2024…
ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends 13 Sep 2024 This…
Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one 16 Sep 2024 • , 3…