Cybersecurity mitigations no organisation can afford to ignore

Code signing is another underused approach, in light of architectural trends that pull code from disparate sources at runtime. In particular, sub-resource integrity (SRI) headers can ensure that external scripts haven’t been modified when they are called at runtime. As applications increasingly rely on external scripts to pull in new features, SRI is a powerful tool to shut down vectors.

ESET gets major recognition for its APT Protection products

ESET has been recognized as a Top Player in Radicati’s 2022 Advanced Persistent Threat (APT) Protection Market Quadrant for the third year in a row.

Here are the 5 antivirus tools you might need

Your computer is vulnerable to attack from hackers and other online criminals. Here are some tips to help you secure your computer and protect your data

Breaking the habit: Top 10 bad cybersecurity habits to stop in 2022

The start of a new year means a fresh start for your digital life. Cybersecurity is increasingly crucial component. In fact, cybercriminals are already predicting that 2021 will be one of their busiest years yet.

Two variants of Tor2Mine invade into networks: Sophos study

“The presence of miners, like Tor2Mine, in a network is almost always a harbinger of other, potentially more dangerous intrusions. However, Tor2Mine is much more aggressive than other miners,”said Sean Gallagher, threat researcher at Sophos.