Generative Data Intelligence

Tag: malware

Why AI Obituary Scams Are a Cyber-Risk for Businesses

Two-bit scammers are generating near-instant obituaries for recently deceased strangers, taking advantage of vulnerable loved ones and potentially infecting their devices with malware.A new...

AceCryptor attacks surge in Europe – Week in security with Tony Anscombe

Video The second half of 2023 saw massive growth in AceCryptor-packed malware spreading...

Cyber Warfare: Understanding New Frontiers in Global Conflicts

COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...

Cyber Warfare: Understanding New Frontiers in Global Conflicts

COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...

United Arab Emirates Faces Intensified Cyber-Risk

The United Arab Emirates' focus on becoming a global hub for business and innovation is driving digital transformation in the Middle East, with the...

Rescoms rides waves of AceCryptor spam

Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...

‘PhantomBlu’ Cyberattackers Backdoor Microsoft Office Users via OLE

A malicious email campaign is targeting hundreds of Microsoft Office users in US-based organizations to deliver a remote access trojan (RAT) that evades detection,...

A prescription for privacy protection: Exercise caution when using a mobile health app

Privacy Given the unhealthy data-collection habits of some mHealth apps, you’re well advised...

In the rush to build AI apps, don’t leave security behind

Feature While in a rush to understand, build, and ship AI products, developers and data scientists are being urged to be mindful of security...

How to share large or sensitive files securely online

How To Here are a few tips for secure file transfers and what...

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure What cyberthreats could wreak havoc on elections this year and how...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?