Even legitimate websites can become traps, and small/home offices need to be prepared

One’s personal digital life may be a threat to business. Small offices and home offices need proper prevention.  Heads of small or home offices most likely know how difficult it is to set boundaries between work and their personal lives. One minute you are doing taxes, and the next, you are browsing the internet looking … More Even legitimate websites can become traps, and small/home offices need to be prepared

Set and protect. A cybersecurity road map for small and home offices

In the evolving world of cyberthreats, small and home offices share a single need: a reliable security solution. If you’re leading a small office, you are likely no stranger to working 12 hours a day. It might even feel like 24/7, doing taxes, communicating with clients, and marketing your business on social media platforms. You … More Set and protect. A cybersecurity road map for small and home offices

Malware hiding in pictures? More likely than you think

There is more to some images than meets the eye – their seemingly innocent façade can mask a sinister threat. Cybersecurity software has grown quite capable of detecting suspicious files, and with businesses becoming increasingly aware of the need to up their security posture with additional layers of protection, subterfuge to evade detection has become … More Malware hiding in pictures? More likely than you think

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

This rundown of 10 cyberattacks against the sports industry shows why every team needs to keep its eyes on the ball when it comes to their security. The Olympic Games, the FIFA World Cup, and the Super Bowl are just a few examples of iconic sporting events that showcase the global significance of the professional … More Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

ESET Research: AceCryptor attacks on the rise

ESET Research has recorded a dramatic increase in AceCryptor attacks, with ESET detections tripling between the first and second halves of 2023, correlating to the protection of 42,000 ESET users worldwide. In recent months, ESET registered a significant change in how AceCryptor is used, namely that the attackers spreading Rescoms (also known as Remcos) started … More ESET Research: AceCryptor attacks on the rise