Category Archives: cyber
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
- Posted by rbetz
- Posted on January 24, 2026
- cyber
- Comments Off on ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
Common Apple Pay scams, and how to stay safe
- Posted by rbetz
- Posted on January 23, 2026
- cyber
- Comments Off on Common Apple Pay scams, and how to stay safe
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
Old habits die hard: 2025’s most common passwords were as predictable as ever
- Posted by rbetz
- Posted on January 21, 2026
- cyber
- Comments Off on Old habits die hard: 2025’s most common passwords were as predictable as ever
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
- Posted by rbetz
- Posted on January 17, 2026
- cyber
- Comments Off on Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
Is it time for internet services to adopt identity verification?
- Posted by rbetz
- Posted on January 15, 2026
- cyber
- Comments Off on Is it time for internet services to adopt identity verification?
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
Your personal information is on the dark web. What happens next?
- Posted by rbetz
- Posted on January 14, 2026
- cyber
- Comments Off on Your personal information is on the dark web. What happens next?
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Credential stuffing: What it is and how to protect yourself
- Posted by rbetz
- Posted on January 9, 2026
- cyber
- Comments Off on Credential stuffing: What it is and how to protect yourself
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
This month in security with Tony Anscombe – December 2025 edition
- Posted by rbetz
- Posted on December 30, 2025
- cyber
- Comments Off on This month in security with Tony Anscombe – December 2025 edition
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
A brush with online fraud: What are brushing scams and how do I stay safe?
- Posted by rbetz
- Posted on December 24, 2025
- cyber
- Comments Off on A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
- Posted by rbetz
- Posted on December 23, 2025
- cyber
- Comments Off on Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
- Posted by rbetz
- Posted on December 19, 2025
- cyber
- Comments Off on LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
ESET Threat Report H2 2025
- Posted by rbetz
- Posted on December 17, 2025
- cyber
- Comments Off on ESET Threat Report H2 2025
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Black Hat Europe 2025: Was that device designed to be on the internet at all?
- Posted by rbetz
- Posted on December 13, 2025
- cyber
- Comments Off on Black Hat Europe 2025: Was that device designed to be on the internet at all?
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
- Posted by rbetz
- Posted on December 12, 2025
- cyber
- Comments Off on Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
Black Hat Europe 2025: Reputation matters – even in the ransomware economy
- Posted by rbetz
- Posted on December 12, 2025
- cyber
- Comments Off on Black Hat Europe 2025: Reputation matters – even in the ransomware economy
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims




