ea

Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack




ea

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app




ea

My health information has been stolen. Now what?

As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records




ea

Hijacked: How hacked YouTube channels spread scams and malware

Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform




ea

ESET Threat Report H1 2024

A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts




ea

The long-tail costs of a data breach – Week in security with Tony Anscombe

Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents




ea

Cyber insurance as part of the cyber threat mitigation strategy

Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies




ea

Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe

Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year




ea

5 common Ticketmaster scams: How fraudsters steal the show

Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account




ea

Social media and teen mental health – Week in security with Tony Anscombe

Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?




ea

The tap-estry of threats targeting Hamster Kombat players

ESET researchers have discovered threats abusing the success of the Hamster Kombat clicker game




ea

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats




ea

Beyond the blue screen of death: Why software updates matter

The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them.




ea

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances




ea

Beware of fake AI tools masking very real malware threats

Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants




ea

The cyberthreat that drives businesses towards cyber risk insurance

Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide




ea

AI and automation reducing breach costs – Week in security with Tony Anscombe

Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies




ea

Why tech-savvy leadership is key to cyber insurance readiness

Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage




ea

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?




ea

NGate Android malware relays NFC traffic to steal cash

Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM




ea

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with




ea

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




ea

In plain sight: Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad




ea

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become




ea

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver




ea

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one




ea

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos




ea

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year




ea

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world




ea

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.




ea

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules




ea

Jane Goodall: Reasons for hope | Starmus highlights

The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity




ea

Learning programming through game building

Jiro's Pick this week is AstroVolley Courseware by Paul Huxel.Back in my undergraduate studies (many, many years ago), I took a Pascal programming course, and it was the first official programming... read more >>




ea

Delhi HC issues notice to Telecom Department on accused judge's plea

Two former high court judges - SN Shukla of the Allahabad High Court and Quddusi of the Odisha High Court - have been charged by the CBI in the case. The agency had produced intercepted phone calls between the two judges as part of its charge sheet filed last July. It had also named other people in the alleged bribery scandal.




ea

Ericsson, Intel team up on 5G development in Malaysia with eye on enterprise use cases

Amongst the areas that Ericsson and Intel have identified for collaboration is the joint development of enterprise use cases in selected verticals such as manufacturing, transport and logistics.




ea

Indus Towers pushes Vi to clear dues, may not allow any new payment plan

At its fiscal fourth quarter earnings call Thursday, Indus' top management said that while Vi has started clearing 90-100% of current dues, the tower company is closely monitoring the telco's payment patterns and its funding situation to recover its accumulated past dues as per the agreed schedule.




ea

Malicious IoT botnet traffic targeting telecoms networks increases 5x over 2022: Nokia

The number of IoT devices (bots) engaged in botnet-driven DDoS attacks rose from around 200,000 a year ago to approximately 1 million devices, generating more than 40% of all DDoS traffic today, according to the report.




ea

TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India

The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP).




ea

Want to be data-driven? Treat data as a product

In today’s data-obsessed era, treating data as you would treat your consumer products can help you realize true value from your investments. Whether individual teams piece together the data and technologies they need or centralized teams extract, cleanse, and aggregate data – the challenges plaguing data managers are many, even if not the same.




ea

Fostering gender diversity: Women leaders in data science share insights

Leading women data scientists and AI leaders talk about fostering more female candidates in the industry and navigating the challenges associated with it.




ea

From data chaos to data value — the undeniable case for data streaming

Data mess isn’t anybody’s fault. The situation many businesses find themselves in today is based on decisions made decades ago. It’s part of our IT legacy. And we have to deal with it.




ea

Data-driven hiring practices, nearly double-digit pay hikes to mark 2024

Employees want workplace flexibility, a greater emphasis on diversity, and impartial hiring processes, while companies are eager to provide fair, engaging and streamlined candidate experiences to attract and retain top talent, according to experts.




ea

ETCIO Data Strategy Summit ‘24: Keynote speakers on finding the right fit with AI

Rajeev Chandrasekhar, Former Union Minister of Electronics and IT, and Raghu Krishnananda, Chief Product and Technology Officer at Myntra, highlighted the trends and case studies impacting consumers and enterprises alike.




ea

Data mesh in the real world: Adaptability vs Feasibility

As businesses continue to explore and adapt Data Mesh, balancing its potential benefits with the realities of execution will be key to realizing its full value, say Data leaders at the ETCIO Data Strategy Summit 2024.




ea

How leaders bring in real business impact of data in enterprises

Harnessing data is a multifaceted endeavor including CX, privacy, modernization, etc. Industry leaders talk about how data can drive substantial business impact while navigating the inherent challenges.




ea

After Karnataka, UP gears up to develop global capability centres

These centres serve as innovation hubs for key business functions such as product development, artificial intelligence (AI), data analytics, and cybersecurity within the state.




ea

Sayed Peerzade to spearhead Jio’s cloud revolution as Executive Vice President

In this new role, he will focus on advancing AI and cloud technologies, leveraging his extensive experience to drive innovation within the organization.




ea

Union Bank of India and Zoho Mark Digital Transformation Success with Leadership Meet

The partnership between Union Bank of India and Zoho began in 2021 after the merger of Andhra Bank and Corporation Bank with Union Bank of India, which significantly expanded its operations.




ea

Krutrim AI business head Ravi Jain resigns

Ola Krutrim is an AI startup, which has formed a series of strategic partnerships with global majors like Arm and Untether AI for the development of CPU and AI chips, platforms, and systems.




ea

LTIMindtree won its largest deal in history due to AI approach: COO

In the second quarter ending September of the ongoing fiscal year 2025, LTIMindtree closed several multi-year projects including a $200 million-plus deal from a US-based manufacturer. The total order intake for the three-month period was flat year-on-year at $1.3 billion, down 7% from previous quarter.