the

The tap-estry of threats targeting Hamster Kombat players

ESET researchers have discovered threats abusing the success of the Hamster Kombat clicker game




the

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos




the

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike




the

Beyond the blue screen of death: Why software updates matter

The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them.




the

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances




the

The cyberthreat that drives businesses towards cyber risk insurance

Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide




the

Top 6 Craigslist scams: Don’t fall for these tricks

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun




the

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?




the

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with




the

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




the

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors




the

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options




the

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks




the

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine




the

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends




the

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.




the

Time to engage: How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app




the

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics




the

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years




the

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia




the

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience




the

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal




the

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week




the

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?




the

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details




the

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities




the

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers




the

Don't become a statistic: Tips to help keep your personal data off the dark web

You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it




the

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules




the

Green IoT: The shift to practical sustainability

Emerging technologies such as 5G, blockchain, and AI are unlocking new IoT use cases in the enterprise. The strategic use of IoT devices allows businesses to create new business models and revenue-generating opportunities as well as drive greater efficiencies across the value chain.




the

From chargers to children's data: How the EU reined in big tech

The groundbreaking Digital Services Act (DSA) and its sister law, the Digital Markets Act (DMA), are the biggest and most recent attempts to rein in tech companies.




the

From data chaos to data value — the undeniable case for data streaming

Data mess isn’t anybody’s fault. The situation many businesses find themselves in today is based on decisions made decades ago. It’s part of our IT legacy. And we have to deal with it.




the

Data analytics is shaping the future of banking

Banks invest in data analytics and AI technologies to enhance customer experience, optimize decision-making, and prevent financial fraud. They focus on platform models, identity analytics, and fraud detection to improve services and security, aiming to capture the customer's financial journey for insights into their buying process.




the

ETCIO Data Strategy Summit ‘24: Keynote speakers on finding the right fit with AI

Rajeev Chandrasekhar, Former Union Minister of Electronics and IT, and Raghu Krishnananda, Chief Product and Technology Officer at Myntra, highlighted the trends and case studies impacting consumers and enterprises alike.




the

Data mesh in the real world: Adaptability vs Feasibility

As businesses continue to explore and adapt Data Mesh, balancing its potential benefits with the realities of execution will be key to realizing its full value, say Data leaders at the ETCIO Data Strategy Summit 2024.




the

Facebook has 3 billion users. Many of them are old.

The once-cool social media platform born before the iPhone is approaching two decades in existence. For those who came of age around the time Mark Zuckerberg launched thefacebook.com from his Harvard dorm room in 2004, it's been inextricably baked into daily life - even if it's somewhat faded into the background over the years.




the

Read what Twitter’s new CEO has to say in her first-ever tweet after getting the top post

Twitter will get a new CEO in six weeks. Twitter owner Elon Musk announced recently that Linda Yaccarino will take the top job. Yaccarino too has officially confirmed that she is taking over as CEO of the microblogging platform. Yaccarino, chairman of global advertising and partnerships at NBCUniversal, said that she has been inspired by owner Musk's vision to create a brighter future.




the

Meta takes aim at Twitter with the launch of rival app Threads

Users get a Twitter-like microblogging experience, according to screenshots provided to media, suggesting that Meta Platforms has been gearing up to directly challenge the platform after Musk's tumultuous ownership has resulted in a series of unpopular changes that have turned off users and advertisers.




the

Brands and creators debate on the future of Meta's Threads as engagement dips

New data apps tracking firm Sensor Tower indicates the hype has died down and Threads has seen a 20% decrease in active users and a 50% reduction in time spent on the app, from 20 minutes to 10 minutes.




the

Stanford engineers develop a plastic clothing material that cools the skin

Stanford engineers have developed a low-cost, plastic-based textile that, if woven into clothing, could cool your body far more efficiently than is possible with the natural or synthetic fabrics in clothes we wear today.

read more



  • Physics & Chemistry

the

Location matters in the self-assembly of nanoclusters

Scientists at Iowa State University have developed a new formulation that helps to explain the self-assembly of atoms into nanoclusters and to advance the scientific understanding of related nanotechnologies. Their research offers a theoretical framework to explain the relationship between the distribution of "capture zones," the regions that surround the nanoscale "islands" formed by deposition on surfaces, and the underlying nucleation or formation process.

read more



  • Physics & Chemistry

the

Tuning the instrument: Spider webs as vibration transmission structures

Two years ago, a research team led by the University of Oxford revealed that, when plucked like a guitar string, spider silk transmits vibrations across a wide range of frequencies, carrying information about prey, mates and even the structural integrity of a web.

read more



  • Physics & Chemistry

the

Tapping the unused potential of photosynthesis

Scientists from the University of Southampton have reengineered the fundamental process of photosynthesis to power useful chemical reactions that could be used to produce biofuels, pharmaceuticals and fine chemicals.

read more



  • Physics & Chemistry

the

Measuring forces in the DNA molecule

DNA, our genetic material, normally has the structure of a twisted rope ladder. Experts call this structure a double helix. Among other things, it is stabilized by stacking forces between base pairs. Scientists at the Technical University of Munich (TUM) have succeeded at measuring these forces for the very first time on the level of single base pairs. This new knowledge could help to construct precise molecular machines out of DNA.

read more



  • Physics & Chemistry

the

A strange thing happened in the stratosphere

This disruption to the wind pattern - called the "quasi-biennial oscillation" - did not have any immediate impact on weather or climate as we experience it on Earth's surface. But it does raise interesting questions for the NASA scientists who observed it: If a pattern holds for six decades and then suddenly changes, what caused that to happen? Will it happen again? What effects might it have?

read more



  • Earth & Climate

the

NASA sees Namtheun dissipating in the Sea of Japan

NASA's Aqua satellite passed over the Sea of Japan and saw Tropical Depression Namtheun weakening.

read more



  • Earth & Climate

the

Nutrient pollution is changing sounds in the sea

Nutrient pollution emptying into seas from cities, towns and agricultural land is changing the sounds made by marine life - and potentially upsetting navigational cues for fish and other sea creatures, a new University of Adelaide study has found.

read more



  • Earth & Climate

the

Seeing the forest for the trees: World's largest reforestation program overlooks wildlife

After years of environmental destruction, China has spent billions of dollars on the world's largest reforestation program, converting a combined area nearly the size of New York and Pennsylvania back to forest.

read more



  • Earth & Climate

the

One-tenth of the world's wilderness lost in 2 decades

A research team including Professor William Laurance from James Cook University has discovered there has been a catastrophic decline in global wilderness areas during the past 20 years.

read more



  • Earth & Climate

the

Thierry Breton: The Frenchman taking on US big tech

He has been in the spotlight in recent weeks after the launch of the first investigations under a new EU law into X (formerly Twitter), Facebook owner Meta and TikTok over the spread of false information and hate speech following the Hamas-Israel conflict.