v

Moving to Evidence-Based Elections

In a new NAE Perspective, authors Barbara B. Simons and Poorvi L. Vora argue that systematic manual examination of ballots, rigorous ballot accounting procedures, and public compliance audits would increase election transparency and are urgently needed.




v

More Investment and Attention Needed to Address Pandemic-Related Harms on Children and Families in Marginalized Communities

Strengthening and expanding critical safety net programs is necessary to address the COVID-19 pandemic’s effects on children and families, says a new report that examines the substantial toll the pandemic has taken on their health and well-being, especially those in marginalized communities.




v

New Report — Review of the Draft Fifth National Climate Assessment




v

Health Care and Child Care Needs Should Be Elevated in the Nation’s Poverty Statistics, Says New Report

The methodology used by the Census Bureau to calculate the Supplemental Poverty Measure should be updated to reflect households’ basic needs and resources to meet those needs more accurately. A new report recommends changes to better account for families’ health care, child care, and housing expenses.




v

National Academies Report Sparks Action to Support National Native Seed Supply

With a call for a concerted effort to build a more robust native seed supply and industry, a recent National Academies report helped spur important local, state, and federal action. The momentum continues as native seed stakeholders gather in Washington, D.C., for the 2023 National Native Seed Conference.




v

Reports & Events Monthly Calendar - April 2023




v

Measurement and Management of Systemic Risk in Gulf of Mexico Offshore Oil and Gas Operations Have Improved Since Deepwater Horizon Disaster, But Progress Lags in Some Areas

Most of the offshore oil and gas industry operating in the Gulf of Mexico has improved its management of systemic risk in recent years, according to a new report that also points out where uneven progress and critical gaps remain for industry and regulators to address.




v

National Academies Launch New Climate Crossroads Initiative

The global community is in a crucial window for taking steps to address the numerous threats that climate change poses. Climate Crossroads is a major new initiative at the National Academies to help the nation meet the challenges of climate change.




v

Policy Impact and Future Directions for Behavioral Economics — New Report

A new National Academies report highlights how behavioral economics has built invaluable evidence about why people may act in seemingly irrational ways, how they respond to interventions, and how public policy can be designed to help people make better decisions.




v

U.S. Should Begin Laying the Foundation for New and Advanced Nuclear Reactors, Says New Report

New nuclear reactor concepts could help the U.S. meet its long-term climate goals, but a range of technical, regulatory, economic, and societal challenges must first be overcome. A new report provides recommendations to start laying the foundation required for advanced reactors to become a viable part of the U.S. energy system.




v

Reports & Events Monthly Calendar - May 2023




v

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings




v

ESET World 2024: Big on prevention, even bigger on AI

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.




v

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?




v

The murky world of password leaks – and how to check if you’ve been hit

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look




v

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!




v

Arid Viper poisons Android apps with AridSpy

ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine




v

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023




v

Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack




v

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app




v

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat




v

Buying a VPN? Here’s what to know and look for

VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes




v

HotPage: Story of a signed, vulnerable, ad-injecting driver

A study of a sophisticated Chinese browser injector that leaves more doors open!




v

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos




v

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats




v

Phishing targeting Polish SMBs continues via ModiLoader

ESET researchers detected multiple, widespread phishing campaigns targeting SMBs in Poland during May 2024, distributing various malware families




v

Beware of fake AI tools masking very real malware threats

Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants




v

The cyberthreat that drives businesses towards cyber risk insurance

Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide




v

Why tech-savvy leadership is key to cyber insurance readiness

Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage




v

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?




v

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors




v

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

Demystifying CVE-2024-7262 and CVE-2024-7263




v

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos




v

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process




v

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices




v

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal




v

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms




v

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers




v

CloudScout: Evasive Panda scouting cloud services

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services




v

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year




v

Tony Fadell: Innovating to save our planet | Starmus highlights

As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts




v

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.




v

ESET APT Activity Report Q2 2024–Q3 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024




v

MCmatlab: A Monte Carlo simulation for photon transport in 3D voxel space

Today, I am inviting Temo, who is from the academic discipline marketing team, and he looks after the physics discipline. He will share his Pick from the field of optics.This week's Pick is MCmatlab... read more >>




v

Statistical visualization functions and “Open in MATLAB Online”

Jiro's Pick this week is dabarplot, daviolinplot, daboxplot by Povilas Karvelis.Today, I'd like to highlight a couple of things in this post.Statistical visualization functions"Open in MATLAB Online"... read more >>




v

Celebrating Pi Day with cool visualizations

Jiro's Pick this week is Happy Pi Day by Zhaoxu Liu / slandarer. I'm a couple of days late, but I wanted to highlight this set of cool visualizations by Zhaoxu for Pi Day. It's amazing to see so... read more >>




v

Visualizing number of letters in a number

Jiro's Pick this week is CountLettersNum by Edgar Guevara.Edgar created this interesting visualization inspired by a blog post by @matthen2. The concept is simple.Start with a number between 1 and... read more >>




v

Report says over 700 million active internet users in India as of December 2022

The active internet user base aged 12 years and older has grown more than 20% year-on-year to reach 595 million in 2022.




v

Internet Archive's digital book lending violates copyrights, US judge rules

The ruling by U.S. District Judge John Koeltl in Manhattan on Friday came in a closely watched lawsuit that tested the ability of Internet Archive to lend out the works of writers and publishers protected by U.S. copyright laws.




v

Ericsson, Intel team up on 5G development in Malaysia with eye on enterprise use cases

Amongst the areas that Ericsson and Intel have identified for collaboration is the joint development of enterprise use cases in selected verticals such as manufacturing, transport and logistics.