A comprehensive security ecosystem is essential for every home

After a year in which we relied heavily on our computers and phones to stay connected, the time spent in apps on a day-to-day basis, and even the number of devices that we used, became greater than ever. When it comes to families, this means there is often a single person taking responsibility for the … More A comprehensive security ecosystem is essential for every home

Boss level hybrid worker – home admins, please apply

Hybrid work is widespread, and people are returning to the office on a more regular basis. This has made managing devices more complicated because for many the line between home devices and office devices has blurred. Unfortunately, most people lean toward efficiency more often than security.  With a return to the office, IT admins may have … More Boss level hybrid worker – home admins, please apply

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

The police sting spanned three continents and involved crackdowns in nine countries. Law enforcement agencies from Europe, the United States and Australia have teamed up to arrest some 150 people who are believed to have sold and bought illegal drugs and other illicit goods on the dark web. “More than €26.7 million (USD 31 million) … More Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

Wslink: Unique and undocumented malicious loader that runs as a server

There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor. ESET researchers have discovered a unique and previously undocumented loader for Windows binaries that, unlike other such loaders, runs as a server and executes received modules in memory. A loader is malicious code (a program) … More Wslink: Unique and undocumented malicious loader that runs as a server

Putting cybersecurity first: Why secure‑by‑design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom. From headline-grabbing stories of ransomware to personal experiences of identity theft, cyber is increasingly finding its way into collective consciousness. During the pandemic, an escalation in threat levels also reminded IT and business leaders what’s … More Putting cybersecurity first: Why secure‑by‑design must be the norm