Imagine vacationing without a smartphone — cybercriminals can’t

With all of the fake websites and apps out there, critical cybersecurity for travelers begins at home before the trip even starts. In the past, when travelers prepared for a long trip, they worried about getting lost, so they packed, among other things, a map, a compass, a radio, a dictionary, and a flashlight. Now … More Imagine vacationing without a smartphone — cybercriminals can’t

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Python’s versatility and short learning curve are just two factors that explain the language’s ‘grip’ on cybersecurity. The Python programming language, born from the creative genius of Guido van Rossum as far back as some 35 years ago, has evolved into a crucial tool for professionals working in various areas, including software development, data science, artificial … More Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

Supporting threat hunters and incident response teams with hands-on data is crucial, as it not only safeguards organizations but provides the basis for a proactive prevention-first security strategy. In recent years, a significant number of cyberattacks have been ransomware related and, despite fluctuations in frequency and intensity, they remain one of the most prevalent and feared … More Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

How technology drives progress – A Q&A with Nobel laureate Michel Mayor

We spoke to Michel Mayor about the importance of public engagement with science and fostering responsibility among the youth for the preservation of our changing planet. Join us as we speak to the Nobel Prize-winning astronomer Michel Mayor about the intersection of technology and scientific discovery, the art of making science accessible to all, and … More How technology drives progress – A Q&A with Nobel laureate Michel Mayor

How to prepare MSPs for advanced phishing without wearing out IT staff

Cybercriminals leverage AceCryptor and Rescoms (RAT) to upgrade spam phishing messages difficult to recognize by both humans and machines. To defend, MSPs automate protection. When cybersecurity experts and vendors describe phishing attacks, they usually split them into two big groups. The first group consists of spam campaigns targeting a broad general audience with simple fraudulent messages. … More How to prepare MSPs for advanced phishing without wearing out IT staff