How do analyst relations professionals ‘sort through the noise’ and help deliver the not-so-secret sauce for a company’s success? We spoke with ESET’s expert to find out. This article has been indexed from WeLiveSecurity Read the original article: Influencing the…
Category: welivesecurity
Understanding cyber-incident disclosure
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help This article has been indexed from WeLiveSecurity Read the original article: Understanding cyber-incident disclosure
CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe
ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends This article has been indexed from WeLiveSecurity Read the original article: CosmicBeetle joins the ranks of RansomHub affiliates –…
6 common Geek Squad scams and how to defend against them
Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks This article has been indexed from WeLiveSecurity Read the original article: 6 common Geek Squad scams and how…
Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams This article has been indexed from WeLiveSecurity Read the original article: Bitcoin…
ESET Research Podcast: HotPage
ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: HotPage
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Demystifying CVE-2024-7262 and CVE-2024-7263 This article has been indexed from WeLiveSecurity Read the original article: Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Stealing cash using NFC relay – Week in Security with Tony Anscombe
The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become This article has been indexed from WeLiveSecurity Read the original article: Stealing cash using NFC relay – Week in Security with…
PWA phishing on Android and iOS – Week in security with Tony Anscombe
Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security This article has been indexed from WeLiveSecurity Read the original article: PWA phishing on Android and iOS – Week in security with…
How regulatory standards and cyber insurance inform each other
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with This article has been indexed from WeLiveSecurity Read the…
How a BEC scam cost a company $60 Million – Week in security with Tony Anscombe
Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme This article has been indexed from WeLiveSecurity Read the original article: How a BEC scam…
The great location leak: Privacy risks in dating apps
Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance This article has been indexed from WeLiveSecurity Read the original article: The great location leak:…
Black Hat USA 2024: All eyes on election security
In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024: All eyes on election security
Black Hat USA 2024 recap – Week in security with Tony Anscombe
Unsurprisingly, many discussions focused on the implications of the recent CrowdStrike outage, including the lessons it may have offered for bad actors This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024 recap – Week…
Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies
Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024: How cyber insurance is…
Why tech-savvy leadership is key to cyber insurance readiness
Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage This article has been indexed from WeLiveSecurity Read the original article: Why tech-savvy leadership is key to cyber insurance readiness
AI and automation reducing breach costs – Week in security with Tony Anscombe
Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by US$2.22 million compared to those that didn’t deploy these technologies, according to IBM This article has been indexed from WeLiveSecurity Read the original…
The cyberthreat that drives businesses towards cyber risk insurance
Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide This article has been indexed from WeLiveSecurity Read the original article:…
Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe
Attackers abusing the “EvilVideo” vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files This article has been indexed from WeLiveSecurity Read the original article: Telegram for Android hit…
Building cyber-resilience: Lessons learned from the CrowdStrike incident
Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances This article has been indexed from WeLiveSecurity Read the original article: Building cyber-resilience: Lessons learned from the CrowdStrike…