Category Archives: cyber
How the always-on generation can level up its cybersecurity game
- Posted by rbetz
- Posted on August 13, 2025
- cyber
- Comments Off on How the always-on generation can level up its cybersecurity game
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
WinRAR zero-day exploited in espionage attacks against high-value targets
- Posted by rbetz
- Posted on August 12, 2025
- cyber
- Comments Off on WinRAR zero-day exploited in espionage attacks against high-value targets
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
- Posted by rbetz
- Posted on August 12, 2025
- cyber
- Comments Off on Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?
- Posted by rbetz
- Posted on August 9, 2025
- cyber
- Comments Off on Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?
A sky-high premium may not always reflect your company’s security posture
Android adware: What is it, and how do I get it off my device?
- Posted by rbetz
- Posted on August 9, 2025
- cyber
- Comments Off on Android adware: What is it, and how do I get it off my device?
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?
- Posted by rbetz
- Posted on August 8, 2025
- cyber
- Comments Off on Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
Black Hat USA 2025: Policy compliance and the myth of the silver bullet
- Posted by rbetz
- Posted on August 8, 2025
- cyber
- Comments Off on Black Hat USA 2025: Policy compliance and the myth of the silver bullet
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch
- Posted by rbetz
- Posted on August 6, 2025
- cyber
- Comments Off on ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)
- Posted by rbetz
- Posted on August 2, 2025
- cyber
- Comments Off on Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)
Here’s what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
Why the tech industry needs to stand firm on preserving end-to-end encryption
- Posted by rbetz
- Posted on August 2, 2025
- cyber
- Comments Off on Why the tech industry needs to stand firm on preserving end-to-end encryption
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
This month in security with Tony Anscombe – July 2025 edition
- Posted by rbetz
- Posted on August 1, 2025
- cyber
- Comments Off on This month in security with Tony Anscombe – July 2025 edition
Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
The hidden risks of browser extensions – and how to stay safe
- Posted by rbetz
- Posted on July 30, 2025
- cyber
- Comments Off on The hidden risks of browser extensions – and how to stay safe
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
SharePoint under fire: ToolShell attacks hit organizations worldwide
- Posted by rbetz
- Posted on July 26, 2025
- cyber
- Comments Off on SharePoint under fire: ToolShell attacks hit organizations worldwide
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
Rogue CAPTCHAs: Look out for phony verification pages spreading malware
- Posted by rbetz
- Posted on July 25, 2025
- cyber
- Comments Off on Rogue CAPTCHAs: Look out for phony verification pages spreading malware
Before rushing to prove that you’re not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
ToolShell: An all-you-can-eat buffet for threat actors
- Posted by rbetz
- Posted on July 25, 2025
- cyber
- Comments Off on ToolShell: An all-you-can-eat buffet for threat actors
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities




