4Chan: destructive hoaxes and the Internet of Not Things
The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.
Results driven. Results delivered.
The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that’s evolved into a sophisticated threat with a modular architecture.
ESET researchers analyzed a campaign delivering malware bundled with job interview challenges
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims’ crypto wallets and steals their login details from web browsers and password managers
Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff
The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here’s how to fight back