Category Archives: cyber
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
- Posted by rbetz
- Posted on December 19, 2025
- cyber
- Comments Off on LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
ESET Threat Report H2 2025
- Posted by rbetz
- Posted on December 17, 2025
- cyber
- Comments Off on ESET Threat Report H2 2025
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Black Hat Europe 2025: Was that device designed to be on the internet at all?
- Posted by rbetz
- Posted on December 13, 2025
- cyber
- Comments Off on Black Hat Europe 2025: Was that device designed to be on the internet at all?
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
Black Hat Europe 2025: Reputation matters – even in the ransomware economy
- Posted by rbetz
- Posted on December 12, 2025
- cyber
- Comments Off on Black Hat Europe 2025: Reputation matters – even in the ransomware economy
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims
Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
- Posted by rbetz
- Posted on December 12, 2025
- cyber
- Comments Off on Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
- Posted by rbetz
- Posted on December 11, 2025
- cyber
- Comments Off on Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
The big catch: How whaling attacks target top executives
- Posted by rbetz
- Posted on December 10, 2025
- cyber
- Comments Off on The big catch: How whaling attacks target top executives
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
- Posted by rbetz
- Posted on December 5, 2025
- cyber
- Comments Off on Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
MuddyWater: Snakes by the riverbank
- Posted by rbetz
- Posted on December 3, 2025
- cyber
- Comments Off on MuddyWater: Snakes by the riverbank
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
Oversharing is not caring: What’s at stake if your employees post too much online
- Posted by rbetz
- Posted on December 2, 2025
- cyber
- Comments Off on Oversharing is not caring: What’s at stake if your employees post too much online
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
This month in security with Tony Anscombe – November 2025 edition
- Posted by rbetz
- Posted on November 29, 2025
- cyber
- Comments Off on This month in security with Tony Anscombe – November 2025 edition
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month’s cybersecurity news
What parents should know to protect their children from doxxing
- Posted by rbetz
- Posted on November 28, 2025
- cyber
- Comments Off on What parents should know to protect their children from doxxing
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
Influencers in the crosshairs: How cybercriminals are targeting content creators
- Posted by rbetz
- Posted on November 26, 2025
- cyber
- Comments Off on Influencers in the crosshairs: How cybercriminals are targeting content creators
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
MDR is the answer – now, what’s the question?
- Posted by rbetz
- Posted on November 25, 2025
- cyber
- Comments Off on MDR is the answer – now, what’s the question?
Why your business needs the best-of-breed combination of technology and human expertise
The OSINT playbook: Find your weak spots before attackers do
- Posted by rbetz
- Posted on November 21, 2025
- cyber
- Comments Off on The OSINT playbook: Find your weak spots before attackers do
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots




