ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora Source Cluster: We Live Security Source Node: 3092794Time Stamp: Jan 31, 2024
Pegasus Spyware Targets Togolese Journalists’ Mobile Devices Source Cluster: Dark reading Source Node: 3088149Time Stamp: Jan 26, 2024
Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine Source Cluster: Dark reading Source Node: 3081540Time Stamp: Jan 23, 2024
Kaspersky Introduces Tool That Detects Pegasus Spyware on iOS Source Cluster: Safety Detectives Source Node: 3070492Time Stamp: Jan 18, 2024
Why Spam Prevention is Crucial for for Data-Driven Business Source Cluster: SmartData Collective Source Node: 3042558Time Stamp: Jan 1, 2024
‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections Source Cluster: Dark reading Source Node: 3040038Time Stamp: Dec 29, 2023
7 Data Security Best Practices for Your Enterprise – DATAVERSITY Source Cluster: DATAVERSITY Source Node: 3040305Time Stamp: Dec 29, 2023
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe Source Cluster: We Live Security Source Node: 3033697Time Stamp: Dec 22, 2023
These aren’t the Android phones you should be looking for Source Cluster: We Live Security Source Node: 3033250Time Stamp: Dec 20, 2023
ESET Threat Report H2 2023 Source Cluster: We Live Security Source Node: 3028486Time Stamp: Dec 19, 2023
European Parliament Faces Challenges in Cyber-Securing Election Source Cluster: Safety Detectives Source Node: 3012341Time Stamp: Dec 13, 2023
Silent but deadly: The rise of zero-click attacks Source Cluster: We Live Security Source Node: 3012354Time Stamp: Dec 11, 2023
Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths Source Cluster: We Live Security Source Node: 2997838Time Stamp: Dec 5, 2023
Spied on while reading the news – Week in security with Tony Anscombe Source Cluster: We Live Security Source Node: 2974353Time Stamp: Nov 10, 2023
Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan Source Cluster: We Live Security Source Node: 2969198Time Stamp: Nov 9, 2023
The history of malware: A primer on the evolution of cyber threats – IBM Blog Source Cluster: IBM Source Node: 2968657Time Stamp: Nov 6, 2023
Tech billionaire Peter Thiel was reportedly an FBI informant – TechStartups Source Cluster: TechStartups Source Node: 2945471Time Stamp: Oct 19, 2023
Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain Source Cluster: Dark reading Source Node: 2911021Time Stamp: Sep 29, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph Source Cluster: We Live Security Source Node: 2899203Time Stamp: Sep 22, 2023
iVerify Raises $4M for its Mobile Security Platform for Both Consumers and the Enterprise Source Cluster: AlleyWatch Source Node: 2894293Time Stamp: Sep 21, 2023