Category Archives: cyber
PlushDaemon compromises network devices for adversary-in-the-middle attacks
- Posted by rbetz
- Posted on November 20, 2025
- cyber
- Comments Off on PlushDaemon compromises network devices for adversary-in-the-middle attacks
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
What if your romantic AI chatbot can’t keep a secret?
- Posted by rbetz
- Posted on November 18, 2025
- cyber
- Comments Off on What if your romantic AI chatbot can’t keep a secret?
Does your chatbot know too much? Think twice before you tell your AI companion everything.
How password managers can be hacked – and how to stay safe
- Posted by rbetz
- Posted on November 14, 2025
- cyber
- Comments Off on How password managers can be hacked – and how to stay safe
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
Why shadow AI could be your biggest security blind spot
- Posted by rbetz
- Posted on November 12, 2025
- cyber
- Comments Off on Why shadow AI could be your biggest security blind spot
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
The who, where, and how of APT attacks in Q2 2025–Q3 2025
- Posted by rbetz
- Posted on November 8, 2025
- cyber
- Comments Off on The who, where, and how of APT attacks in Q2 2025–Q3 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
In memoriam: David Harley
- Posted by rbetz
- Posted on November 8, 2025
- cyber
- Comments Off on In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
ESET APT Activity Report Q2 2025–Q3 2025
- Posted by rbetz
- Posted on November 7, 2025
- cyber
- Comments Off on ESET APT Activity Report Q2 2025–Q3 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming
- Posted by rbetz
- Posted on November 6, 2025
- cyber
- Comments Off on Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)
- Posted by rbetz
- Posted on November 5, 2025
- cyber
- Comments Off on How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)
Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
Cybersecurity Awareness Month 2025: Building resilience against ransomware
- Posted by rbetz
- Posted on November 3, 2025
- cyber
- Comments Off on Cybersecurity Awareness Month 2025: Building resilience against ransomware
Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
SnakeStealer: How it preys on personal data – and how you can protect yourself
- Posted by rbetz
- Posted on November 3, 2025
- cyber
- Comments Off on SnakeStealer: How it preys on personal data – and how you can protect yourself
Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year’s infostealer detection charts
Gotta fly: Lazarus targets the UAV sector
- Posted by rbetz
- Posted on November 3, 2025
- cyber
- Comments Off on Gotta fly: Lazarus targets the UAV sector
ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows
- Posted by rbetz
- Posted on November 3, 2025
- cyber
- Comments Off on Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
How MDR can give MSPs the edge in a competitive market
- Posted by rbetz
- Posted on November 3, 2025
- cyber
- Comments Off on How MDR can give MSPs the edge in a competitive market
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
Recruitment red flags: Can you spot a spy posing as a job seeker?
- Posted by rbetz
- Posted on November 3, 2025
- cyber
- Comments Off on Recruitment red flags: Can you spot a spy posing as a job seeker?
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms




