When love hurts: Watch out for romance scams this Valentine’s Day

Don’t be the next victim – spot the signs of a faux romance in time and send that scammer ‘packing’. It is a truth universally acknowledged that we’re all looking for a special someone to share our lives with. Some of us are lucky enough to find that person. For the rest, the search goes … More When love hurts: Watch out for romance scams this Valentine’s Day

Hidden in plain sight: How the dark web is spilling onto social media

A trip into the dark corners of Telegram, which has become a magnet for criminals peddling everything from illegal drugs to fake money and COVID-19 vaccine passes. Just a few years ago, illicit services and online contraband were firmly sourced in the hidden, largely untraceable depths of the internet: the dark web. People frequenting dark web … More Hidden in plain sight: How the dark web is spilling onto social media

Safer Internet Day: Together for a better internet

Today we stand by our friends and colleagues throughout the industry to make the internet a safer and better place for all, especially children. Together we can ensure a better internet. #SaferInternetDay #SID2022 From the Safer Internet Day website @ https://www.saferinternetday.org/ Join us on Tuesday, 8 February 2022 as we celebrate the 19th edition of Safer Internet Day with actions … More Safer Internet Day: Together for a better internet

ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors

The exclusive research included in the report provides previously unpublished information about APT group operations: ProxyShell exploitation; OilRig campaign and activities by the infamous cyberespionage group the Dukes (aka Cozy Bear). ProxyLogon vulnerability was the second most frequent external attack vector in ESET’s 2021 statistics, right after password-guessing attacks. Microsoft Exchange servers fell under siege … More ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors