Cyberespionage the Gamaredon way

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics. When describing state-backed threat actors, one would probably expect a super sophisticated, stealthy group capable of avoiding all alarms and defenses with surgical precision. With Gamaredon, most of that goes out the … More Cyberespionage the Gamaredon way

Beyond the checkbox: Demystifying cybersecurity compliance

In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business. What is the most common pain point facing businesses these days? Is it supply chain fragility? Fierce competition? Tight cashflows? Or is it the rising … More Beyond the checkbox: Demystifying cybersecurity compliance

Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

Amazon confirmed that over 2.86 million of the more than 5 million records of employee data was exposed in a breach linked to the MOVEit vulnerability (CVE-2023-34362). According to The Register*, the breach affected a property management vendor, compromising work contact information such as email addresses, phone numbers, and building locations. Although many companies were … More Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

Beats by bot: The AI remix revolution

Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of sound. Artificial Intelligence (AI) and Machine Learning (ML) algorithms have the power to write and send messages responding to your online retail queries, suggest what films you might like based on your watching … More Beats by bot: The AI remix revolution

Why botnet tracking is so effective

When cybersecurity vendors invest heavily into sophisticated malware replication mechanisms studying real-life malware behavior in isolated environments, one may ask what the point of malware tracking is. What do we learn by extracting data from malicious code without it running or communicating with a command and control (C&C) server? Using the Grandoreiro banking trojan as … More Why botnet tracking is so effective