Category Archives: cyber
Gamaredon X Turla collab
- Posted by rbetz
- Posted on September 20, 2025
- cyber
- Comments Off on Gamaredon X Turla collab
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
Small businesses, big targets: Protecting your business against ransomware
- Posted by rbetz
- Posted on September 19, 2025
- cyber
- Comments Off on Small businesses, big targets: Protecting your business against ransomware
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
HybridPetya: The Petya/NotPetya copycat comes with a twist
- Posted by rbetz
- Posted on September 17, 2025
- cyber
- Comments Off on HybridPetya: The Petya/NotPetya copycat comes with a twist
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
- Posted by rbetz
- Posted on September 13, 2025
- cyber
- Comments Off on Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
Are cybercriminals hacking your systems – or just logging in?
- Posted by rbetz
- Posted on September 12, 2025
- cyber
- Comments Off on Are cybercriminals hacking your systems – or just logging in?
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked tight
Preventing business disruption and building cyber-resilience with MDR
- Posted by rbetz
- Posted on September 10, 2025
- cyber
- Comments Off on Preventing business disruption and building cyber-resilience with MDR
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
Under lock and key: Safeguarding business data with encryption
- Posted by rbetz
- Posted on September 6, 2025
- cyber
- Comments Off on Under lock and key: Safeguarding business data with encryption
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
- Posted by rbetz
- Posted on September 5, 2025
- cyber
- Comments Off on GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
This month in security with Tony Anscombe – August 2025 edition
- Posted by rbetz
- Posted on August 29, 2025
- cyber
- Comments Off on This month in security with Tony Anscombe – August 2025 edition
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
Don’t let “back to school” become “back to (cyber)bullying”
- Posted by rbetz
- Posted on August 28, 2025
- cyber
- Comments Off on Don’t let “back to school” become “back to (cyber)bullying”
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
First known AI-powered ransomware uncovered by ESET Research
- Posted by rbetz
- Posted on August 27, 2025
- cyber
- Comments Off on First known AI-powered ransomware uncovered by ESET Research
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
The need for speed: Why organizations are turning to rapid, trustworthy MDR
- Posted by rbetz
- Posted on August 22, 2025
- cyber
- Comments Off on The need for speed: Why organizations are turning to rapid, trustworthy MDR
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
“What happens online stays online” and other cyberbullying myths, debunked
- Posted by rbetz
- Posted on August 22, 2025
- cyber
- Comments Off on “What happens online stays online” and other cyberbullying myths, debunked
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
Investors beware: AI-powered financial scams swamp social media
- Posted by rbetz
- Posted on August 19, 2025
- cyber
- Comments Off on Investors beware: AI-powered financial scams swamp social media
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
Supply-chain dependencies: Check your resilience blind spot
- Posted by rbetz
- Posted on August 13, 2025
- cyber
- Comments Off on Supply-chain dependencies: Check your resilience blind spot
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?




