Allow me to frame the threat of cybercrime that we all face by quoting from Jeff Debrosse’s 2009 Cybersecurity Review white paper:...
We have discussed SEO poisoning extensively in the ESET Threat Blog, and it should come as no surprise to our readers that...
A short time ago I was watching someone I know type in a password to an important web site. I wasn’t looking...
September 2009 saw some key security analysis raining directly onto the Adobe PDF platform, particularly with SANS pointing towards remote code execution...
SANS posted a story at the Internet Storm Center a couple of days ago that they were seeing fake email from the...
A couple of weeks ago I posted an entry on here about the size of the cybercrime problem from a dollar perspective....
About a month ago I gave a presentation in Kuala Lumpur that covered some of the concerns about the seemingly enthusiastic rush...
[Interim updates removed: later information on Twitter profile attacks and Blackhat SEO attacks using keywords related to this topic to spread malware,...
Looking into their crystal balls (no jokes, please) at the end of 2009, our colleagues in Latin America came up with a...
There's a news item out at the moment about how a French man has been arrested for a host of Twitter account...
A flurry of long-overdue government initiatives designed to address cybercrime has begun to actually develop some momentum. When I consider that it...
Two weeks ago I acted as a panelist in a panel discussion at an IT Security conference in Kuala Lumpur. I was...
Engineers are really smart people who often know how to make something with no real world effectiveness work really well without effect....
Back on the 22nd of February, I wrote an entry on this blog called "Does Anybody Know WHOIS Out There?". This entry...
The Apple iPad is the current gadget du jour amongst the digerati and has been seeing strong presales, with estimates as high...
The Anti-Phishing Working Group has asked its members to publicize the forthcoming Counter eCrime Operations Summit in Brazil, which I'm pleased to...
[Update: so far I have two votes for dumb. Maybe I'm giving this spammer too much credit, and it is a simple...
It has been a year since we last discussed fraudulent domain name registrar scams and we wanted to let people know that...
Greetings, friends and fiends. It's been a while since I've been able to blog: I've been trying out one of these vacation...
We have recently seen some reports that give some idea of the real size of the cybercrime problem. Recently Federal Deposit Insurance...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment