The evolving landscape of data privacy: Key trends to shape 2025 Security Incoming laws, combined with broader developments on the threat landscape,… rooter February 17, 2025 1 min read 0
Going (for) broke: 6 common online betting scams and how to avoid them Security Don’t roll the dice on your online safety – watch… rooter February 17, 2025 1 min read 0
My information was stolen. Now what? Security The slow and painful recovery process rooter February 17, 2025 1 min read 0
Kathryn Thornton: Correcting Hubble’s vision | Starmus highlights Security The veteran of four space missions discusses challenges faced by… rooter February 17, 2025 1 min read 0
RomCom exploits Firefox and Windows zero days in the wild Security ESET Research details the analysis of a previously unknown vulnerability… rooter February 17, 2025 1 min read 0
Bootkitty: Analyzing the first UEFI bootkit for Linux Security ESET researchers analyze the first UEFI bootkit designed for Linux… rooter February 17, 2025 1 min read 0
Scams to look out for this holiday season Security ‘Tis the season to be wary – be on your… rooter February 17, 2025 1 min read 0
Firefox and Windows zero days chained to deliver the RomCom backdoor Security The backdoor can execute commands and lets attackers download additional… rooter February 17, 2025 1 min read 0
Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights Security ESET’s CEO unpacks the complexities of cybersecurity in today’s hyper-connected… rooter February 17, 2025 1 min read 0
Bootkitty marks a new chapter in the evolution of UEFI threats Security ESET researchers make a discovery that signals a shift on… rooter February 17, 2025 1 min read 0