The algorithms that suggest your kids’ content

When considering mental health issues linked to online behavior, our thoughts may turn to cyberbullying, but there is another concern far more formidable than we might realize — access. Search engines have given us easy access to more and seemingly ever-fresh sources of content that have the potential to be just as detrimental, if not … More The algorithms that suggest your kids’ content

ESET Research discovers vulnerabilities in Lenovo consumer laptops exposing users to risk of UEFI malware installation

Exploitation of these vulnerabilities would allow attackers to deploy and successfully execute UEFI malware such as LoJax and ESPecter. UEFI threats can be extremely stealthy and dangerous. · Discovered vulnerabilities: CVE-2021-3970, CVE-2021-3971, CVE-2021-3972. ESET Research strongly advises all owners of Lenovo consumer laptops to go through the list of affected devices and update their firmware. … More ESET Research discovers vulnerabilities in Lenovo consumer laptops exposing users to risk of UEFI malware installation

Industroyer2: Industroyer reloaded

This ICS-capable malware targets a Ukrainian energy company. Executive summary The blogpost presents the analysis of a cyberattack against a Ukrainian energy provider. Key points: ESET researchers collaborated with CERT-UA to analyze the attack against the Ukrainian energy company The destructive actions were scheduled for 2022-04-08 but artefacts suggest that the attack had been planned … More Industroyer2: Industroyer reloaded

Coercion, trolling and abuse: Keep your children safe when they’re meeting people online

From predatory tactics to online bullying: tips for keeping your kids safe. Children and teenagers spend hours interacting with others on the internet. But social media and online gaming also give opportunities to those who want to harm your child. Such platforms allow anyone to access large online communities more or less anonymously, attracting bullies, … More Coercion, trolling and abuse: Keep your children safe when they’re meeting people online

How secure is your cloud storage? Mitigating data security risks in the cloud

As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice. For weeks, cybersecurity experts and government agencies have been urging organizations to enhance their cyber-defenses due to the increased threat of cyberattacks. That means not only improving detection and response for emerging … More How secure is your cloud storage? Mitigating data security risks in the cloud