News Feed
- por Robert Lemos, Contributing WriterInfiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving the uptake of encrypted communications.
- por Tara Seals, Managing Editor, News, Dark ReadingThe zero-day (CVE-2024-49138), plus a worryingly critical unauthenticated RCE security vulnerability (CVE-2024-49112), are unwanted gifts for security admins this season.
- por Jai Vijayan, Contributing WriterThe threat actor group recently took credit for a similar attack on Blue Yonder that affected multiple organizations, including Starbucks.
- por Kristina Beek, Associate Editor, Dark ReadingBecause the streaming service website offers no content restrictions, attackers are able to hijack and manipulate live streams.
- por Elizabeth Montalbano, Contributing WriterThe Nemesis and ShinyHunters attackers scanned millions of IP addresses to find exploitable cloud-based flaws, though their operation ironically was discovered due to a cloud misconfiguration of their own doing.
- Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules
- An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024
- The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity
- Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories
- Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.