Worth of your personal data on the dark web
Amer Owaida, Security Writer at ESET discusses that the going prices are lower than you probably think – your credit card details, for example, can sell for a few bucksRead More…
Amer Owaida, Security Writer at ESET discusses that the going prices are lower than you probably think – your credit card details, for example, can sell for a few bucksRead More…
ESET has published a comprehensive overview of risks stemming from Thunderspy, a series of vulnerabilities in Thunderbolt technology, and possible protections. Via Thunderspy, an attacker can change, possibly can even remove the security measures of the Thunderbolt interface on a computer.Read More…
ESET, will highlight its latest research during Black Hat USA 2020. ESET researchers Robert Lipovský, Štefan Svorenčík and Vladislav Hrčka will present this today, on “KrØØk: Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices” and “Stantinko Deobfuscation Arsenal.”Read More…
ESET has released its Q2 2020 Threat Report, summarizing key statistics from ESET detection systems and highlighting notable examples of ESET’s cybersecurity research, including exclusive, previously unpublished ESET research updates. Read More…
SlovakAid, a humanitarian relief program from the Slovak Republic sent a plane from Bratislava on Sunday carrying COVID-19 supplies include 50,000 diagnostic tests, one PCR thermocycler device to perform the tests and 20,000 FFP2 respirators, which arrived in Nairobi on Monday morning. Read More…
Leading cybersecurity vendor, ESET, today announced that it has garnered high scores for its Endpoint Protection Advanced Cloud in the AV-Comparatives H1 Business Security Test 2020.Read More…
Lukas Stefanko, the malware researcher at ESET gives Channel Post a peek behind the scenes of his analysis of CryCryptor ransomware as he speaks to us about the ins and outs of CryCryptor and about how this ransomware family compares to other threats facing Android users not only during theRead More…
Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in your networkRead More…
Channel Post MEA in conversation with Husni Hammoud, Managing Director at ESET Middle East about the impact of COVID-19 on its business and how is ESET trying to cope up with this pandemic situation.Read More…
ESET researchers expose the operations of Evilnum, the APT group behind the Evilnum malware. According to ESET’s telemetry, the targets are financial technology companies – for example, platforms and tools for online trading.Read More…
ESET researchers have discovered a new operation within a long-running cyber-espionage campaign in the Middle East, apparently with links to the threat actor group known as Gaza Hackers, or Molerats.Read More…
As Australian Prime Minister Scott Morrison sounded the alarm on nation-state attacks targeting critical infrastructure in the land Down Under, the Australian Cyber Security Centre released an advisory detailing tactics, techniques and procedures observed in the attacks.Read More…
Copyright © 2026 - Zarks Media. All rights reserved
Stay ahead of the digital revolution in the Middle East & Africa