HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality This article has been indexed from WeLiveSecurity Read the original article: HybridPetya: The Petya/NotPetya copycat comes with a twist
Category: welivesecurity
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal This article has been indexed from WeLiveSecurity Read the original article: Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
Are cybercriminals hacking your systems – or just logging in?
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked tight This article has been indexed from WeLiveSecurity Read the original article: Are cybercriminals hacking your systems…
Preventing business disruption and building cyber-resilience with MDR
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy This article has been indexed from WeLiveSecurity Read the original article: Preventing business disruption and building cyber-resilience…
Under lock and key: Safeguarding business data with encryption
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose This article has been indexed from WeLiveSecurity Read the original article: Under lock and key:…
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results This article has been indexed from WeLiveSecurity Read the original article: GhostRedirector poisons Windows…
This month in security with Tony Anscombe – August 2025 edition
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news This article has been indexed from WeLiveSecurity Read the…
Don’t let “back to school” become “back to (cyber)bullying”
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back This article has been indexed from WeLiveSecurity Read the original article: Don’t let “back to school” become “back to (cyber)bullying”
First known AI-powered ransomware uncovered by ESET Research
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats This article has been indexed from WeLiveSecurity Read the original article: First known AI-powered ransomware uncovered by ESET Research
“What happens online stays online” and other cyberbullying myths, debunked
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment. This article has been indexed from WeLiveSecurity Read the original article: “What happens online stays online”…
Investors beware: AI-powered financial scams swamp social media
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think. This article has been indexed from WeLiveSecurity Read the original article: Investors beware: AI-powered financial scams swamp social media
How the always-on generation can level up its cybersecurity game
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think This article has been indexed from WeLiveSecurity Read the original article: How the always-on generation can level up its cybersecurity…
Supply-chain dependencies: Check your resilience blind spot
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them? This article has been indexed from WeLiveSecurity Read the original article: Supply-chain dependencies: Check your resilience blind spot
Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets This article has been indexed from WeLiveSecurity Read…
WinRAR zero-day exploited in espionage attacks against high-value targets
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds This article has been indexed from WeLiveSecurity Read the original article: WinRAR zero-day exploited in espionage attacks against high-value targets
Android adware: What is it, and how do I get it off my device?
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do. This article has been indexed from WeLiveSecurity Read the original article: Android adware: What is it, and how do…
Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?
A sky-high premium may not always reflect your company’s security posture This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?
Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?
Black Hat USA 2025: Policy compliance and the myth of the silver bullet
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong? This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2025: Policy compliance and the myth of the silver bullet
ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another This article has been indexed from WeLiveSecurity Read the original article: ESET Threat…