Fast forward a decade and Sandworm continues to target entities operating in various critical infrastructure sectors, especially in Ukraine. In their latest APT Activity Report, covering April to ...
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well.
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question ...
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development.
This blogpost presents a compiled overview of the disruptive wiper attacks that we have observed in Ukraine since the beginning of 2022, shortly before the Russian military invasion started. We were ...
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates ...
Common Apple Pay scams, and how to stay safe Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead Why LinkedIn is a hunting ground for threat ...
Why LinkedIn is a hunting ground for threat actors – and how to protect yourself The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe ...
If you think you’ve fallen victim to an Apple Pay scam, time is of the essence. It may be possible to cancel a payment, by ...