As highlighted by new ESET research this week, attributing a cyberattack to a specific threat actor is a complex affair This article has been indexed from WeLiveSecurity Read the original article: The complexities of attack attribution – Week in security…
Tag: welivesecurity
Why system resilience should mainly be the job of the OS, not just third-party applications
Building efficient recovery options will drive ecosystem resilience This article has been indexed from WeLiveSecurity Read the original article: Why system resilience should mainly be the job of the OS, not just third-party applications
Gamaredon’s operations under the microscope – Week in security with Tony Anscombe
ESET research examines the group’s malicious wares as used to spy on targets in Ukraine in the past two years This article has been indexed from WeLiveSecurity Read the original article: Gamaredon’s operations under the microscope – Week in security…
Don’t panic and other tips for staying safe from scareware
Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics This article has been indexed from WeLiveSecurity Read the original article: Don’t panic and other tips for staying safe from scareware
FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe
With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process This article has been indexed from WeLiveSecurity Read the original article: FBI, CISA warning…
Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)
How do analyst relations professionals ‘sort through the noise’ and help deliver the not-so-secret sauce for a company’s success? We spoke with ESET’s expert to find out. This article has been indexed from WeLiveSecurity Read the original article: Influencing the…
Understanding cyber-incident disclosure
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help This article has been indexed from WeLiveSecurity Read the original article: Understanding cyber-incident disclosure
CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe
ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends This article has been indexed from WeLiveSecurity Read the original article: CosmicBeetle joins the ranks of RansomHub affiliates –…
6 common Geek Squad scams and how to defend against them
Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks This article has been indexed from WeLiveSecurity Read the original article: 6 common Geek Squad scams and how…
Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams This article has been indexed from WeLiveSecurity Read the original article: Bitcoin…
ESET Research Podcast: HotPage
ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: HotPage
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Demystifying CVE-2024-7262 and CVE-2024-7263 This article has been indexed from WeLiveSecurity Read the original article: Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Stealing cash using NFC relay – Week in Security with Tony Anscombe
The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become This article has been indexed from WeLiveSecurity Read the original article: Stealing cash using NFC relay – Week in Security with…
PWA phishing on Android and iOS – Week in security with Tony Anscombe
Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security This article has been indexed from WeLiveSecurity Read the original article: PWA phishing on Android and iOS – Week in security with…
How regulatory standards and cyber insurance inform each other
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with This article has been indexed from WeLiveSecurity Read the…
How a BEC scam cost a company $60 Million – Week in security with Tony Anscombe
Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme This article has been indexed from WeLiveSecurity Read the original article: How a BEC scam…
The great location leak: Privacy risks in dating apps
Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance This article has been indexed from WeLiveSecurity Read the original article: The great location leak:…
Black Hat USA 2024: All eyes on election security
In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024: All eyes on election security
Black Hat USA 2024 recap – Week in security with Tony Anscombe
Unsurprisingly, many discussions focused on the implications of the recent CrowdStrike outage, including the lessons it may have offered for bad actors This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024 recap – Week…
Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies
Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024: How cyber insurance is…