ri

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike




ri

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats




ri

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances




ri

Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe

Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files




ri

The cyberthreat that drives businesses towards cyber risk insurance

Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide




ri

AI and automation reducing breach costs – Week in security with Tony Anscombe

Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies




ri

Top 6 Craigslist scams: Don’t fall for these tricks

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun




ri

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards




ri

Black Hat USA 2024: All eyes on election security

In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated




ri

Black Hat USA 2024 recap – Week in security with Tony Anscombe

Unsurprisingly, many discussions revolved around the implications of the CrowdStrike outage, including the lessons it may have offered for bad actors




ri

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?




ri

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme




ri

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




ri

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors




ri

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security




ri

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become




ri

CosmicBeetle steps up: Probation period at RansomHub

CosmicBeetle, after improving its own ransomware, tries its luck as a RansomHub affiliate




ri

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams




ri

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one




ri

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends




ri

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.




ri

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process




ri

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices




ri

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years




ri

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms




ri

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week




ri

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?




ri

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry




ri

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details




ri

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities




ri

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship




ri

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year




ri

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories




ri

Random String Utility

Will's pick this week is Random String Utility by Dan Couture. This is an oldie but a goodie. This submission is from 2012 but still works just fine in R2022b (another testament to the... read more >>




ri

Internet Archive's digital book lending violates copyrights, US judge rules

The ruling by U.S. District Judge John Koeltl in Manhattan on Friday came in a closely watched lawsuit that tested the ability of Internet Archive to lend out the works of writers and publishers protected by U.S. copyright laws.




ri

TRAI suggests MIB to design a suitable PLI scheme for STB manufacturing

The Telecom Regulatory Authority of India (TRAI) has recommended that linear set-top boxes (STBs) be included in the PLI scheme to promote local manufacturing in the television broadcasting sector. The TRAI has also suggested conducting periodic reviews of indigenous components, factoring in local components in determining localisation levels under the PLI scheme, and reviewing investment outlays required for MSME manufacturing for selected equipment.




ri

Ericsson, Intel team up on 5G development in Malaysia with eye on enterprise use cases

Amongst the areas that Ericsson and Intel have identified for collaboration is the joint development of enterprise use cases in selected verticals such as manufacturing, transport and logistics.




ri

Unlocking digital transformation goals for Indian enterprises with 5G

Recently, India's Hon’ble Prime Minister, Narendra Modi, inaugurated the 5G service, affirming that "India will lead the Industry 4.0 revolution with 5G at the helm." Commenting on this technology, certain experts predicted that by 2035, 5G will have a cumulative economic impact of US$ 1 trillion, and between 2025 and 2040, it could deliver an additional GDP of US$ 150 billion for the country. This aligns with India's vision of becoming a US$ 5 trillion economy by 2025.




ri

Nokia, A1 Group successfully trial 5G SA Cloud RAN

“The trial, which took place in Sofia, saw the companies successfully perform an end-to-end 5G data call (Layer 3 call) utilising Nokia’s Cloud RAN solution as well as its AirFrame servers,” Nokia said in a statement.




ri

Govt should allot spectrum directly to enterprises for private networks: Voice

However, telecom operators associations COAI recently said private 5G network deployments by system integrators may lead to operational inefficiencies, capital burden, and eventually prove to be counter-productive.




ri

TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India

The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP).




ri

LTTS partners Palo Alto Network on 5G, OT security offerings

The new MSSP agreement will provide a managed service offering for Palo Alto Networks Zero Trust OT Security solution, allowing customers to outsource the management of their OT security to LTTS.




ri

Want to be data-driven? Treat data as a product

In today’s data-obsessed era, treating data as you would treat your consumer products can help you realize true value from your investments. Whether individual teams piece together the data and technologies they need or centralized teams extract, cleanse, and aggregate data – the challenges plaguing data managers are many, even if not the same.




ri

Ravi Vijayaraghavan sheds light on Flipkart's data-driven success

Flipkart has not only maintained its position as a retail giant but also evolved into a data-driven juggernaut.




ri

Fostering gender diversity: Women leaders in data science share insights

Leading women data scientists and AI leaders talk about fostering more female candidates in the industry and navigating the challenges associated with it.




ri

Data-driven hiring practices, nearly double-digit pay hikes to mark 2024

Employees want workplace flexibility, a greater emphasis on diversity, and impartial hiring processes, while companies are eager to provide fair, engaging and streamlined candidate experiences to attract and retain top talent, according to experts.




ri

ETCIO Data Strategy Summit ‘24: Keynote speakers on finding the right fit with AI

Rajeev Chandrasekhar, Former Union Minister of Electronics and IT, and Raghu Krishnananda, Chief Product and Technology Officer at Myntra, highlighted the trends and case studies impacting consumers and enterprises alike.




ri

How leaders bring in real business impact of data in enterprises

Harnessing data is a multifaceted endeavor including CX, privacy, modernization, etc. Industry leaders talk about how data can drive substantial business impact while navigating the inherent challenges.




ri

Data is critical for any economy, will drive UP's growth: Western Digital official

Talking about Uttar Pradesh, Wani said the development of cities like Lucknow, Noida, and Ghaziabad as key financial hubs underscore the state's commitment to harnessing the growth potential.




ri

Google spends Rs 23,000 crore to bring back former AI employee, sparks overspending debate in AI race

Noam Shazeer, an AI pioneer who left Google in 2021, has returned to the company after Google paid $2.7 billion to acquire his startup, Character.AI. Shazeer is now a vice president at Google and will lead the development of their next-generation AI project, Gemini. This move highlights the intense competition for top AI talent in Silicon Valley.