The media is awash with talk about the benefits of Artificial Intelligence (AI) and Machine Learning (ML) in cyber security. Next-generation vendors are increasingly bringing AI-based cyber security…
Using remote access tools Quasar, Sobaken and Vermin, cybercriminals have been systematically spying on Ukrainian government institutions and exfiltrating data from their systems. The threat actors,…
Cybersecurity used to be regarded solely as an IT issue; a concern discussed only by experts in the field. Today, terms such as ‘hacking’, ‘ransomware’ and ‘data breach’ commonly grab headlines in…
For several years, the research team at ESET has been issuing its Trends report, which provides a review of the latest and most significant developments in information security, and presents the key…
The cyber security landscape has evolved dramatically in recent years. Gone are the days when ‘hacking’ was confined to a tech savvy few, flexing their online prowess for recognition among their…
Before the age of sixteen, Australian children now commonly have their own laptop, smartphone, or tablet, and children as young as five years old are using the internet unsupervised.
“The…