Category Archives: cyber
EDR killers explained: Beyond the drivers
- Posted by rbetz
- Posted on March 20, 2026
- cyber
- Comments Off on EDR killers explained: Beyond the drivers
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers
Face value: What it takes to fool facial recognition
- Posted by rbetz
- Posted on March 14, 2026
- cyber
- Comments Off on Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he’ll demo it all at RSAC 2026
Cyber fallout from the Iran war: What to have on your radar
- Posted by rbetz
- Posted on March 13, 2026
- cyber
- Comments Off on Cyber fallout from the Iran war: What to have on your radar
The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.
Sednit reloaded: Back in the trenches
- Posted by rbetz
- Posted on March 11, 2026
- cyber
- Comments Off on Sednit reloaded: Back in the trenches
The resurgence of one of Russia’s most notorious APT groups
What cybersecurity actually does for your business
- Posted by rbetz
- Posted on March 7, 2026
- cyber
- Comments Off on What cybersecurity actually does for your business
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed
How SMBs use threat research and MDR to build a defensive edge
- Posted by rbetz
- Posted on March 6, 2026
- cyber
- Comments Off on How SMBs use threat research and MDR to build a defensive edge
We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses
Protecting education: How MDR can tip the balance in favor of schools
- Posted by rbetz
- Posted on March 5, 2026
- cyber
- Comments Off on Protecting education: How MDR can tip the balance in favor of schools
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?
This month in security with Tony Anscombe – February 2026 edition
- Posted by rbetz
- Posted on March 1, 2026
- cyber
- Comments Off on This month in security with Tony Anscombe – February 2026 edition
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools
Mobile app permissions (still) matter more than you may think
- Posted by rbetz
- Posted on February 28, 2026
- cyber
- Comments Off on Mobile app permissions (still) matter more than you may think
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.
Faking it on the phone: How to tell if a voice call is AI or not
- Posted by rbetz
- Posted on February 24, 2026
- cyber
- Comments Off on Faking it on the phone: How to tell if a voice call is AI or not
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.
Is Poshmark safe? How to buy and sell without getting scammed
- Posted by rbetz
- Posted on February 20, 2026
- cyber
- Comments Off on Is Poshmark safe? How to buy and sell without getting scammed
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.
PromptSpy ushers in the era of Android threats using GenAI
- Posted by rbetz
- Posted on February 20, 2026
- cyber
- Comments Off on PromptSpy ushers in the era of Android threats using GenAI
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
Is it OK to let your children post selfies online?
- Posted by rbetz
- Posted on February 18, 2026
- cyber
- Comments Off on Is it OK to let your children post selfies online?
When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
Naming and shaming: How ransomware groups tighten the screws on victims
- Posted by rbetz
- Posted on February 13, 2026
- cyber
- Comments Off on Naming and shaming: How ransomware groups tighten the screws on victims
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
Taxing times: Top IRS scams to look out for in 2026
- Posted by rbetz
- Posted on February 11, 2026
- cyber
- Comments Off on Taxing times: Top IRS scams to look out for in 2026
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.




