• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Recent content by Virus_Alert

  1. V

    Why the tech industry needs to stand firm on preserving end-to-end encryption

    Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity Continue reading...
  2. V

    Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)

    Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much Continue reading...
  3. V

    This month in security with Tony Anscombe – July 2025 edition

    Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025 Continue reading...
  4. V

    The hidden risks of browser extensions – and how to stay safe

    Not all browser add-ons are handy helpers – some may contain far more than you have bargained for Continue reading...
  5. V

    SharePoint under fire: ToolShell attacks hit organizations worldwide

    The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks Continue reading...
  6. V

    Rogue CAPTCHAs: Look out for phony verification pages spreading malware

    Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware Continue reading...
  7. V

    ToolShell: An all-you-can-eat buffet for threat actors

    ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities Continue reading...
  8. V

    Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)

    Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and why you might be the product. Continue reading...
  9. V

    Unmasking AsyncRAT: Navigating the labyrinth of forks

    ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants Continue reading...
  10. V

    How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

    Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field. Continue reading...
  11. V

    Task scams: Why you should never pay to get paid

    Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams. Continue reading...
  12. V

    How government cyber cuts will affect you and your business

    Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks Continue reading...
  13. V

    Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

    ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024 Continue reading...
  14. V

    ESET Threat Report H1 2025: Key findings

    ESET Chief Security Evangelist Tony Anscombe reviews some of the report's standout findings and their implications for organizations in 2025 and beyond Continue reading...
  15. V

    ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits

    ESET experts discuss Sandworm’s new data wiper, UnsolicitedBooker’s relentless campaigns, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report Continue reading...
Back
Top