ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications Source link lol

Read More

Video Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes 15 Dec 2023 Apple has shipped iOS 17.2 to all users and it includes a new feature that is intended to protect users from attackers who could be misusing the…

Read More

ESET Research ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces 18 Dec 2023  •  , 1 min. read In this episode of our podcast, ESET malware researchers talk about the dynamics within and between various Neanderthal groups, the…

Read More

ESET Research, Threat Reports A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts 19 Dec 2023  •  , 2 min. read The second half of 2023 witnessed significant cybersecurity incidents. Cl0p, a notorious cybercriminal group known for carrying out ransomware…

Read More

When shopping for a new smartphone, you’re likely to look for the best bang for your buck. If you’re on the hunt for a top-of-the-range device but aren’t keen on paying top dollar for it, offerings from lesser-known manufacturers will probably make your shortlist. Indeed, in the fiercely competitive smartphone market you may be even…

Read More

Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly Source link lol

Read More

How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET’s latest Threat Report Source link lol

Read More

Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information Source link lol

Read More

As we draw the curtain on another eventful year in cybersecurity, let’s review some of the high-profile cyber-incidents that befell various organizations this year Source link lol

Read More

Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. Source link lol

Read More