Beyond the checkbox: Demystifying cybersecurity compliance

In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business. What is the most common pain point facing businesses these days? Is it supply chain fragility? Fierce competition? Tight cashflows? Or is it the rising … More Beyond the checkbox: Demystifying cybersecurity compliance

Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

Amazon confirmed that over 2.86 million of the more than 5 million records of employee data was exposed in a breach linked to the MOVEit vulnerability (CVE-2023-34362). According to The Register*, the breach affected a property management vendor, compromising work contact information such as email addresses, phone numbers, and building locations. Although many companies were … More Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

Beats by bot: The AI remix revolution

Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of sound. Artificial Intelligence (AI) and Machine Learning (ML) algorithms have the power to write and send messages responding to your online retail queries, suggest what films you might like based on your watching … More Beats by bot: The AI remix revolution

Why botnet tracking is so effective

When cybersecurity vendors invest heavily into sophisticated malware replication mechanisms studying real-life malware behavior in isolated environments, one may ask what the point of malware tracking is. What do we learn by extracting data from malicious code without it running or communicating with a command and control (C&C) server? Using the Grandoreiro banking trojan as … More Why botnet tracking is so effective

Days after takedown, ESET Research releases analysis of RedLine Stealer infostealer empire

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules. Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into this infostealer’s undocumented backend modules, which assisted law enforcement in the takedown effort. The in-depth technical analysis … More Days after takedown, ESET Research releases analysis of RedLine Stealer infostealer empire