-
Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems
-
Black Hat Europe 2024: Hacking a car – or rather, its infotainment system
Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow
-
Black Hat Europe 2024: Can AI systems be socially engineered?
Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?
-
How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)
As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s rapidly evolving threats?
-
Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost
-
Philip Torr: AI to the people | Starmus Highlights
We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact
-
This month in security with Tony Anscombe – November 2024 edition
Zero days under attack, a new advisory from ‘Five Eyes’, thousands of ICS units left exposed, and mandatory MFA for all – it’s a wrap on another month filled with impactful cybersecurity news
-
Bootkitty marks a new chapter in the evolution of UEFI threats
ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats
-
RomCom exploits Firefox and Windows zero days in the wild
ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit
-
Firefox and Windows zero days chained to deliver the RomCom backdoor
The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds