Category Archives: cyber
The calm before the ransom: What you see is not all there is
- Posted by rbetz
- Posted on April 25, 2026
- cyber
- Comments Off on The calm before the ransom: What you see is not all there is
A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
GopherWhisper: A burrow full of malware
- Posted by rbetz
- Posted on April 24, 2026
- cyber
- Comments Off on GopherWhisper: A burrow full of malware
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
New NGate variant hides in a trojanized NFC payment app
- Posted by rbetz
- Posted on April 22, 2026
- cyber
- Comments Off on New NGate variant hides in a trojanized NFC payment app
ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
What the ransom note won’t say
- Posted by rbetz
- Posted on April 21, 2026
- cyber
- Comments Off on What the ransom note won’t say
An attack is what you see, but a business operation is what you’re up against
That data breach alert might be a trap
- Posted by rbetz
- Posted on April 18, 2026
- cyber
- Comments Off on That data breach alert might be a trap
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
Supply chain dependencies: Have you checked your blind spot?
- Posted by rbetz
- Posted on April 17, 2026
- cyber
- Comments Off on Supply chain dependencies: Have you checked your blind spot?
Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
- Posted by rbetz
- Posted on April 11, 2026
- cyber
- Comments Off on Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.
As breakout time accelerates, prevention-first cybersecurity takes center stage
- Posted by rbetz
- Posted on April 8, 2026
- cyber
- Comments Off on As breakout time accelerates, prevention-first cybersecurity takes center stage
Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.
Digital assets after death: Managing risks to your loved one’s digital estate
- Posted by rbetz
- Posted on April 2, 2026
- cyber
- Comments Off on Digital assets after death: Managing risks to your loved one’s digital estate
Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
This month in security with Tony Anscombe – March 2026 edition
- Posted by rbetz
- Posted on April 1, 2026
- cyber
- Comments Off on This month in security with Tony Anscombe – March 2026 edition
The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan
RSAC 2026 wrap-up – Week in security with Tony Anscombe
- Posted by rbetz
- Posted on March 28, 2026
- cyber
- Comments Off on RSAC 2026 wrap-up – Week in security with Tony Anscombe
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven’t caught up with
A cunning predator: How Silver Fox preys on Japanese firms this tax season
- Posted by rbetz
- Posted on March 28, 2026
- cyber
- Comments Off on A cunning predator: How Silver Fox preys on Japanese firms this tax season
Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them
Virtual machines, virtually everywhere – and with real security gaps
- Posted by rbetz
- Posted on March 26, 2026
- cyber
- Comments Off on Virtual machines, virtually everywhere – and with real security gaps
Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves
Cloud workload security: Mind the gaps
- Posted by rbetz
- Posted on March 25, 2026
- cyber
- Comments Off on Cloud workload security: Mind the gaps
As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning
Move fast and save things: A quick guide to recovering a hacked account
- Posted by rbetz
- Posted on March 21, 2026
- cyber
- Comments Off on Move fast and save things: A quick guide to recovering a hacked account
What you do – and how fast – after an account is compromised often matters more than it may seem




