20k security people within the desert – Week in safety with Tony Anscombe

Video Unsurprisingly, synthetic intelligence took the middle stage at this yr’s edition of Black Hat, one…

Evacuation of 30,000 hackers – Week in safety with Tony Anscombe

Video DEF CON, the annual hacker conference in Las Vegas, was interrupted on Saturday evening when…

Scarabs colon-izing vulnerable servers

In this blogpost, ESET researchers take a look at Spacecolon, a small toolset used to deploy…

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

ESET researchers have uncovered a Lazarus attack against an aerospace company in Spain, where the group…

How Lazarus impersonated Meta to attack a goal in Spain – Week in security with Tony Anscombe

Video In the course of the assault, the group deployed a number of instruments, most notably…

5 of the top programming languages for cybersecurity

Secure Coding While removed from all roles in security explicitly demand coding expertise, it’s difficult to…

Can open-supply software program be secure?

Secure Coding, Enterprise Safety Or, is mass public meddling simply opening the door for issues? And…

What you could find out about iCloud Personal Relay

Privateness If you wish to attempt to enter the world of VPNs with a small dip,…

How a Telegram bot helps scammers target victims – Week in safety with Tony Anscombe

Video ESET researchers uncover a Telegram bot that permits even less tech-savvy scammers to defraud individuals…

Stealth Falcon preying over Middle Eastern skies with Deadglyph

For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent…

Translate »