and

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?




and

The murky world of password leaks – and how to check if you’ve been hit

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look




and

Arid Viper poisons Android apps with AridSpy

ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine




and

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app




and

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat




and

Hijacked: How hacked YouTube channels spread scams and malware

Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform




and

Buying a VPN? Here’s what to know and look for

VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes




and

AI in the workplace: The good, the bad, and the algorithmic

While AI can liberate us from tedious tasks and even eliminate human error, it's crucial to remember its weaknesses and the unique capabilities that humans bring to the table




and

Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe

Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year




and

Social media and teen mental health – Week in security with Tony Anscombe

Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?




and

Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4)

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?




and

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos




and

Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe

Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files




and

AI and automation reducing breach costs – Week in security with Tony Anscombe

Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies




and

NGate Android malware relays NFC traffic to steal cash

Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM




and

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with




and

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




and

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security




and

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks




and

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine




and

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help




and

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics




and

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia




and

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?




and

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry




and

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers




and

CloudScout: Evasive Panda scouting cloud services

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services




and

Random String Utility

Will's pick this week is Random String Utility by Dan Couture. This is an oldie but a goodie. This submission is from 2012 but still works just fine in R2022b (another testament to the... read more >>




and

Statistical visualization functions and “Open in MATLAB Online”

Jiro's Pick this week is dabarplot, daviolinplot, daboxplot by Povilas Karvelis.Today, I'd like to highlight a couple of things in this post.Statistical visualization functions"Open in MATLAB Online"... read more >>




and

Airtel, Secure Meters to offer Narrow Band-IoT services

​​"IoT is one of the fastest-growing business segments for Airtel Business. This venture into NB-IoT strengthens our credentials as the largest cellular IoT player in the country and places us as a partner of choice for Discoms looking to invest in smart meters," said Ajay Chitkara, director and CEO, Airtel Business.




and

TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India

The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP).




and

Project Wave: Indian Bank joins hands with NeSL to roll out digital services

The digital services will reduce the turn-around time of the bank guarantee issuance and delivery to the beneficiary from an industry average of 3-4 working days to a few minutes.




and

Leveraging data in your AI strategy: Gopichand Katragadda, Myelin Foundry

As organizations harness the power of data, they can unlock new possibilities and drive transformative initiatives. Katragadda's insights make it abundantly clear that data is the cornerstone of any AI strategy.




and

Simplify and accelerate your cloud journey: Genie Yuan, Couchbase

As the cloud becomes an integral part of the business infrastructure, the need for a streamlined, accelerated approach to cloud adoption coupled with consistency in technology stacks is more pronounced than ever. Genie Yuan, Regional VP and Head of Field Engineering for APJ at Couchbase, shares key insights.




and

Navigating data localization laws in an evolving business landscape

As the digital economy expands, so does the volume of data generated and stored within India. This presents an opportunity for the government to implement data localization policies to safeguard sensitive data, protect national security, and promote the growth of the domestic IT industry and related sectors.




and

Cisco opens first India plant: Excited about India as a market and export hub, says CEO Chuck Robbins

Cisco’s new facility at Chennai will manufacture Network Convergence System (NCS) 540 Series of routers.




and

Union Bank of India and Zoho Mark Digital Transformation Success with Leadership Meet

The partnership between Union Bank of India and Zoho began in 2021 after the merger of Andhra Bank and Corporation Bank with Union Bank of India, which significantly expanded its operations.




and

IBM drives manufacturing's digital shift with AI, IoT, and sustainability focus

IBM Executive Director Rajesh Parameswaran outlines key trends and strategies to transform manufacturing through technology.




and

Bandhan Financial Services acquires global IT company Genisys

Bandhan Financial Services Ltd (BFSL), promoter of Bandhan Bank, has ventured into the IT sector by acquiring Genisys group of companies for nearly Rs 100 crore. This strategic move aims to leverage technology for business solutions and enhance shareholder value. Genisys, specializing in AI-enabled solutions for various sectors, will operate under BFSL with expanded capabilities.




and

Amazon CEO Andy Jassy explains why he hates bureaucracy

Amazon CEO Andy Jassy, in a recent internal meeting, outlined the company's strategy to reduce management layers, aiming to eliminate bureaucracy and foster a more agile and innovative culture. Citing the rapidly evolving tech landscape, Jassy emphasized the need for faster decision-making and increased individual ownership.




and

LinkedIn cuts over 700 jobs, exits China app as demand wavers

LinkedIn, which has 20,000 employees, has grown revenue each quarter during the last year, but it joins other major technology companies including its parent in laying off workers amid a weakening global economic outlook.




and

Brands and creators debate on the future of Meta's Threads as engagement dips

New data apps tracking firm Sensor Tower indicates the hype has died down and Threads has seen a 20% decrease in active users and a 50% reduction in time spent on the app, from 20 minutes to 10 minutes.




and

Why Elon Musk rebranded Twitter as X

Since taking over Twitter last November, Tesla chief Elon Musk has transformed it. From selling the verified badge for $8 a month to letting creators monetise their content, Musk has revamped many things at the microblogging site, except for its iconic bird logo. That, however, is about to change.




and

NASA sees Hurricane Newton approaching landfall in Baja California, Mexico

NASA's Terra satellite and a NASA animation of imagery from NOAA's GOES-West satellite provided views of Hurricane Newton as it neared landfall in Baja California, Mexico, today, Sept. 6.

read more



  • Earth & Climate

and

NIST and Navy tests suggest telecom networks could back up GPS time signals

Precision time signals sent through the Global Positioning System (GPS) synchronize cellphone calls, time-stamp financial transactions, and support safe travel by aircraft, ship, train and car.

read more



  • Earth & Climate

and

DPDPA and client data: Banks now fret over liability

​Bank CEOs are tapping top legal minds, alerting their compliance teams, and discussing with each other to spot the pitfalls of the Digital Personal Data Protection Act (DPDPA) - a statute under which hundreds of crores of fines can be imposed on organisations for breaches.




and

How Karza Technologies makes due diligence and onboarding simpler for banks & NBFCs

One of the key pillars of growth for the Indian economy are small and medium-sized businesses, which generate roughly 30 percent of the countrys GDP and provide jobs to over 110 million people.




and

How the renewed data protection landscape impact BPO industry

With the increased focus on data security and privacy, BPO service providers will need to restructure their data compliance plan ahead of time. This is not only to ensure that the soon-to-be-updated rules are implemented in a timely manner but also to improve customer service efficiency and increase the firm's general reputation.




and

AI has made testing tools and systems more responsive and agile

Managers in Industry 4.0 will need risk management skills, says Rekha Sethi, director-general of AIMA




and

Godrej & Boyce uses AI, ML, and analytics to improve product quality and reduce defects

G&B has deployed over 80 RPA bots to automate manual processes across the value chain. This has resulted in productivity improvement, reduction in errors and improvement of employee experience.