Category Archives: cyber
The quest for greater tech independence
- Posted by rbetz
- Posted on May 20, 2026
- cyber
- Comments Off on The quest for greater tech independence
A complete decoupling from US technology is neither realistic nor necessary, but the changing environment does require nations and companies to reassess their relationships and dependencies
Why geopolitical turmoil is a gift for scammers, and how to stay safe
- Posted by rbetz
- Posted on May 16, 2026
- cyber
- Comments Off on Why geopolitical turmoil is a gift for scammers, and how to stay safe
Conflict is a boon for opportunistic fraudsters. Look out for their ploys.
FrostyNeighbor: Fresh mischief and digital shenanigans
- Posted by rbetz
- Posted on May 15, 2026
- cyber
- Comments Off on FrostyNeighbor: Fresh mischief and digital shenanigans
ESET researchers uncovered new activities attributed to FrostyNeighbor, updating its compromise chain to support the group’s continual cyberespionage operations
Eyes wide open: How to mitigate the security and privacy risks of smart glasses
- Posted by rbetz
- Posted on May 12, 2026
- cyber
- Comments Off on Eyes wide open: How to mitigate the security and privacy risks of smart glasses
Smart glasses allow anyone to track and record the world around them. That could put your data and the privacy of those nearby at risk.
Fake call logs, real payments: How CallPhantom tricks Android users
- Posted by rbetz
- Posted on May 8, 2026
- cyber
- Comments Off on Fake call logs, real payments: How CallPhantom tricks Android users
ESET researchers uncovered fraudulent apps on Google Play that claim to provide the call history “for any number” and had been downloaded more than seven million times before being taken down
Fixing the password problem is as easy as 123456
- Posted by rbetz
- Posted on May 8, 2026
- cyber
- Comments Off on Fixing the password problem is as easy as 123456
How come it’s still possible to ‘secure’ an online account with a six-digit string?
A rigged game: ScarCruft compromises gaming platform in a supply-chain attack
- Posted by rbetz
- Posted on May 6, 2026
- cyber
- Comments Off on A rigged game: ScarCruft compromises gaming platform in a supply-chain attack
ESET researchers have investigated an ongoing attack by the ScarCruft APT group that targets the Yanbian region via backdoor-laced Windows and Android games
This month in security with Tony Anscombe – April 2026 edition
- Posted by rbetz
- Posted on May 1, 2026
- cyber
- Comments Off on This month in security with Tony Anscombe – April 2026 edition
Warnings about helpdesk impersonation scams and Iran-linked hackers targeting critical sectors in the US, plus the most damaging scams of 2025 – here’s some of what made the headlines this month
The calm before the ransom: What you see is not all there is
- Posted by rbetz
- Posted on April 25, 2026
- cyber
- Comments Off on The calm before the ransom: What you see is not all there is
A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
GopherWhisper: A burrow full of malware
- Posted by rbetz
- Posted on April 24, 2026
- cyber
- Comments Off on GopherWhisper: A burrow full of malware
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
New NGate variant hides in a trojanized NFC payment app
- Posted by rbetz
- Posted on April 22, 2026
- cyber
- Comments Off on New NGate variant hides in a trojanized NFC payment app
ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
What the ransom note won’t say
- Posted by rbetz
- Posted on April 21, 2026
- cyber
- Comments Off on What the ransom note won’t say
An attack is what you see, but a business operation is what you’re up against
That data breach alert might be a trap
- Posted by rbetz
- Posted on April 18, 2026
- cyber
- Comments Off on That data breach alert might be a trap
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
Supply chain dependencies: Have you checked your blind spot?
- Posted by rbetz
- Posted on April 17, 2026
- cyber
- Comments Off on Supply chain dependencies: Have you checked your blind spot?
Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
- Posted by rbetz
- Posted on April 11, 2026
- cyber
- Comments Off on Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.




