POPULARITY
La Cepal apunta que México, Brasil y Chile han tenido éxodo de talento para AI | Walmart insiste: BAIT suma 26.4 millones de usuarios activos, el triple de lo que dice la CRT | Anthropic lanza Claude Code Security, un agente autónomo para ciberseguridad | Aimx propone en el Senado consejo multisectorial sobre buenas prácticas de AI | Las breves de la semana sobre la Cumbre sobre el Impacto de la AI en India | Así lo dijo el senador Rolando Rodrigo Zapata | Latino Seguros es una de las historias innovadoras | El prompt que me cambió la vida es del investigador de ciberseguridad para AL de ESET, David González | Erik Johanssen, CTO de Banco Pagatodo, nos comparte el IT Masters Insight
On pensait l'intelligence artificielle générative cantonnée aux assistants virtuels et aux outils de productivité. Mais elle intéresse aussi les cybercriminels. Le 19 février 2026, les chercheurs d'ESET ont révélé l'existence de PromptSpy, un malware Android qui s'appuie sur le modèle Gemini de Google pour s'adapter aux téléphones de ses victimes. Et ce n'est peut-être qu'un avant-goût de ce qui arrive. Pour comprendre ce qui rend PromptSpy inédit, il faut revenir aux limites des malwares classiques. Habituellement, ces logiciels malveillants fonctionnent avec des scripts rigides : des coordonnées de clics prédéfinies, des boutons identifiés à l'avance. Problème : Android n'est pas uniforme. Chaque constructeur modifie l'interface, chaque mise à jour peut déplacer les menus. Résultat, les scripts se retrouvent vite obsolètes.PromptSpy contourne cette faiblesse grâce à l'IA. Concrètement, il capture une image de l'écran de la victime et l'envoie à Gemini. Le modèle analyse les éléments visibles — boutons, textes, icônes — et renvoie des instructions personnalisées, comme « appuie ici » ou « fais glisser là ». Selon Lukas Stefanko, chercheur chez ESET, cette approche permet au malware de s'adapter automatiquement à n'importe quel smartphone ou version d'Android. Une souplesse inédite. L'objectif principal est la persistance : rester installé quoi qu'il arrive. PromptSpy se verrouille dans la liste des applications récentes d'Android, en s'épinglant avec un cadenas virtuel. Impossible alors de le fermer d'un simple geste. Le dialogue avec l'IA continue jusqu'à confirmation que le verrouillage est effectif.Mais le cœur du danger réside ailleurs : dans un module VNC. Cette technologie permet aux attaquants de voir l'écran en temps réel et de contrôler le téléphone à distance, comme s'ils le tenaient en main. Le malware abuse aussi des services d'accessibilité — des fonctions prévues à l'origine pour aider les personnes en situation de handicap — afin d'empêcher la désinstallation grâce à des superpositions invisibles. Les chercheurs ont découvert ces zones cachées en activant un mode de débogage laissé dans le code. PromptSpy peut enregistrer l'écran, récupérer des codes PIN, lister les applications installées et transmettre ces données via des communications chiffrées. Pour le supprimer, il faut redémarrer en mode sans échec — un mode qui désactive les applications tierces — puis effacer l'application frauduleuse, baptisée MorganArg, qui imite une banque. Pour l'instant, aucune infection massive n'a été détectée. Mais pour ESET, le signal est clair : après PromptLock en 2025, l'IA devient un outil d'adaptation pour les malwares. Google a été alerté et Play Protect bloque les versions identifiées Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
Hot Topic Topic: Report reveals phishing as top weapon against SA organisations – Tony Anscombe: Chief security evangelist, ESET
Bob Bonneau, country manager for ESET Canada ESET Canada recently celebrated a decade since the company formally opened up shop in this country, ten years that have been filled with growth in the channel and evolution in both the cybersecurity threatscape and how businesses defend themselves. Bob Bonneau, country manager for ESET Canada, joins us on this edition of the podcast to take a look back at the company's run in this country and where he sees things heading. We discuss: the theme of the first decade in Canada for ESET; the evolution of the Canadian cybersecurity landscape over the last ten years; the big milestones of ESET's first decade in Canada; how the organizational structure in Canada has changed over the years; how ESET addresses both the under-representation of women in technology and the skills gap in cybersecurity; ESET's partnership with the Calgary Flames and its role in the company's growth in the west; the rise of managed service providers in the ESET channel; being a Europe-based company and operating in North America; whether Canadian businesses are in better shape or worse when it comes to cybersecurity a decade later; and what the channel can expect from ESET over the near future All that and more in this edition of the ChannelBuzz.ca Podcast.
Aujourd'hui, je te recommande un podcast… dans lequel j'ai été interviewée !Marine m'a invitée dans Work in Process pour parler d'un sujet qu'on adore toutes les deux :les petites offres (ou “produits d'appel”, ou “offres pied dans la porte”).L'épisode s'intitule « Comment créer des produits d'appel et des petites offres irrésistibles ».On y parle :– de quand et pourquoi créer ce type d'offres– de comment les promouvoir efficacement– et de pourquoi elles sont souvent sous-estiméesEt si tu veux prolonger ta réflexion, je t'ai préparé une petite sélection de Minutes Marines :– MM#99 : c'est quoi une offre de service ?– MM#102 : les offres pied dans la porte– MM#188 : les différents types d'offresEt toi, t'as déjà testé une offre pied dans la porte ?Tu sais ce que tu veux vendre, et à qui ?(Pour me répondre, envoie-moi un mp sur Linkedin
Z čašníka a pomocníka na patológii až na pódiá, kde prednáša tisíckam ľudí. Pavla to do sveta kyberbezpečnosti odvialo úplne náhodou. 9 rokov bol v ESET-e a dnes má svoju vlastnú firmu, ktorá učí ľudí nenechať sa v online priestore nachytať.
Ce mardi 3 février, Frédéric Simottel a reçu André Loesekrug-Pietri, président de Joint European Disruptive Initiative ; Benoît Ranini, président cofondateur du cabinet TNP ; Alix Mirshams, directeur général d'Opteamis ; Anthony Lambert, cofondateur de Boond ; Gérôme Billois, expert et associé chez Wavestone ; Pascal Le Digol, directeur général France-Watchguard ; Michel Juvin, ecosystem advisor chez Alliancy et Benoît Grünemwald, expert cybersécurité chez ESET, dans l'émission Tech&Co Business sur BFM Business. Retrouvez l'émission le samedi et réécoutez la en podcast.
Mardi 3 février, Frédéric Simottel a reçu Gérôme Billois, expert et associé chez Wavestone, Pascal Le Digol, directeur général France-Watchguard, Michel Juvin, ecosystem advisor chez Alliancy, et Benoît Grünemwald, expert cybersécurité chez ESET, dans l'émission Tech&Co Business sur BFM Business. Retrouvez l'émission le samedi et réécoutez la en podcast.
In this edition of Between Two Nerds Tom Uren and The Grugq discuss the recent Russian attack on Polish electricity infrastructure. This episode is also available on Youtube. Show notes ESET's first report ESET's update report CERT-PL report Dragos report The Insider 'Hidden Bear' investigation BTN 124, How Russia's sabotage team got into hacking BTN 145, Russia's cyber war on wheat
(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
In this interview, ESET cybersecurity expert Josep Albors discusses the evolving landscape of digital threats within the video game industry. He explains how the shift toward online connectivity has expanded the attack surface, allowing criminals to use malicious game cracks, phishing links, and deceptive in-game chats to steal valuable account credentials or financial data. Beyond individual victims, Albors warns that gaming software can serve as a gateway into corporate networks through unpatched vulnerabilities or advanced "anti-cheat" tools that possess deep system access. The conversation highlights the rise of speculative virtual economies and the exploitation of vulnerable players, including minors and high-profile streamers. Ultimately, the expert emphasizes that while games are not inherently dangerous, users and guardians must maintain digital awareness and utilize security measures like two-factor authentication to mitigate risks. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Josep Albors, especialista de ESET, analiza la evolución de los videojuegos hacia un modelo predominantemente online. Este cambio ha atraído a ciberdelincuentes que buscan beneficios económicos mediante el robo de credenciales y cuentas. Los atacantes utilizan "cracks" maliciosos que infectan dispositivos con troyanos bajo la promesa de software gratuito. Existe un mercado negro para el robo de objetos virtuales valiosos, como "skins" de alto coste monetario. Plataformas como Steam o Discord son usadas para distribuir malware o como centros de mando y control. Se menciona el peligro de usar dispositivos corporativos para jugar, abriendo puertas a redes empresariales. Los chats de juegos facilitan estafas dirigidas tanto a menores como a adultos mediante engaños emocionales. Se reportan casos graves, como el robo de donaciones a un streamer enfermo mediante un juego troyanizado. El experto advierte sobre los riesgos de seguridad de los sistemas antitrampas con permisos de nivel de kernel. La prevención técnica debe acompañarse de una mejor identificación de usuarios y gestión de vulnerabilidades. Albors subraya que es vital la concienciación y la implicación de los padres en la actividad lúdica de menores. El resumen concluye recomendando el Museo del Videojuego de Ibi para fomentar la cultura y seguridad digital. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
In this interview, ESET cybersecurity expert Josep Albors discusses the evolving landscape of digital threats within the video game industry. He explains how the shift toward online connectivity has expanded the attack surface, allowing criminals to use malicious game cracks, phishing links, and deceptive in-game chats to steal valuable account credentials or financial data. Beyond individual victims, Albors warns that gaming software can serve as a gateway into corporate networks through unpatched vulnerabilities or advanced "anti-cheat" tools that possess deep system access. The conversation highlights the rise of speculative virtual economies and the exploitation of vulnerable players, including minors and high-profile streamers. Ultimately, the expert emphasizes that while games are not inherently dangerous, users and guardians must maintain digital awareness and utilize security measures like two-factor authentication to mitigate risks. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok's creation of sexually explicit images. Glimmers of access pierce Iran's internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland's energy sector to Russia's Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is cybersecurity executive and friend of the show Brandon Karpf with Dave Bittner and T-Minus Space Daily host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “No more free rides: it's time to pay for space safety.” Selected Reading FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys (Hackread) European Commission opens new investigation into X's Grok (The Register) Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online (New York Times) Hackers can bypass npm's Shai-Hulud defenses via Git dependencies (Bleeping Computer) Microsoft investigates Windows 11 boot failures after January updates (Bleeping Computer) CISA says critical VMware RCE flaw now actively exploited (Bleeping Computer) CISA confirms active exploitation of four enterprise software bugs (Bleeping Computer) ESET Research: Sandworm behind cyberattack on Poland's power grid in late 2025 (ESET) Aikido secures $60 million in Series B funding. (N2K Pro Business Briefing) CISA won't attend infosec industry's biggest conference (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
En este programa analizamos las tendencias actuales de la ciberdelincuencia, centrándose en el entorno de los videojuegos y la protección de la identidad digital. Los expertos comentan el reciente desmantelamiento de una red de phishing por la Guardia Civil que operaba bajo el modelo "Crime as a Service", facilitando herramientas para clonar páginas bancarias. En el ámbito del gaming, Josep Albors de ESET explica cómo los delincuentes utilizan chats y falsos "cracks" para infectar dispositivos y robar cuentas con activos valiosos, como los skins. Se exponen incidentes graves, como el compromiso de servidores de juegos para atacar a usuarios y el robo de criptomonedas a streamers mediante software troyanizado. El podcast también aborda el ataque a Discord a través de su proveedor Zendesk, el cual expuso documentos de identidad oficiales de miles de usuarios. En cuanto a redes sociales, se advierte contra las nuevas estafas en grupos de WhatsApp y se recomienda configurar la privacidad para evitar ser incluido en chats desconocidos. Los especialistas recalcan que la seguridad absoluta no existe y que es vital que los padres se involucren activamente en la vida digital de los menores para prevenir el ciberacoso. La charla también destaca la necesidad de la ciberresiliencia empresarial mediante modelos como "Zero Trust" para resistir y recuperarse de ataques inevitables. Se desmitifica que los videojuegos sean solo para niños, señalando que la media de edad del jugador supera los 30 años, lo que exige una mayor conciencia global. Finalmente, se invita a los oyentes a visitar el Museo del Videojuego de Ibi para fomentar la cultura y la seguridad en este sector. El episodio concluye enfatizando el uso del sentido común en entornos de ocio, donde solemos bajar la guardia ante posibles enlaces maliciosos. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Inicia con intermitencias el registro de usuarios de telefonía móvil | UNAM reconoce intrusión no autorizada en cinco de sus sistemas informáticos | Snowflake suma Gemini 3 de Google para su plataforma Cortex AI | xAI reporta una pérdida neta de $1,460 millones de dólares | Las breves de la semana sobre el CES 2026 en Las Vegas | Así lo dijo, el investigador de ciberseguridad para AL de ESET, David González | ISCAM es una de las historias innovadoras | El prompt que me cambió la vida es del director de Tecnología de información de Banco Regional, Elías Perry | Juan Carlos Olvera, CISO de Iconn, nos comparte el IT Masters Insight
No episódio desta quarta-feira (7), conversamos com Daniel Barbosa, pesquisador de segurança da ESET no Brasil, sobre as perigosas tendências de golpes digitais para 2026. O especialista detalha como a inteligência artificial é usada para criar Deepfakes de voz e vídeo extremamente realistas e aprimorar a engenharia social, e por que o Pix é um alvo de fraude tão desejado por golpistas. Você também vai conferir: Novo iPhone "barato" está a caminho; X afirma que vai suspender contas de quem cria conteúdos ilegais com a IA Grok; Google facilita migração de arquivos do Dropbox para o Drive nas empresas. Este podcast foi roteirizado e apresentado por Marcelo Fischer, e contou com reportagens de Vinícius Moschen, Viviane França e João Melo, sob coordenação de Anaísa Catucci. A trilha sonora é de Guilherme Zomer, a edição de Lívia Strazza e a arte da capa é de Erick Teixeira.See omnystudio.com/listener for privacy information.
Pénzszórás a győzelemért, biztonsági garanciák vereség esetére Csapásmérő ukrán drónokról tett közzé felvételt Moszkva a Putyin rezidenciája elleni támadás után Eredeti hangszereléssel csendült fel a Himnusz 2026 első perceiben Teli naptárat örökölt Ferenc pápától Xiv. Leó – Ilyen volt az új pápa első éve Jegesedik a Balaton A további adásainkat keresd a podcast.hirstart.hu oldalunkon. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Pénzszórás a győzelemért, biztonsági garanciák vereség esetére Csapásmérő ukrán drónokról tett közzé felvételt Moszkva a Putyin rezidenciája elleni támadás után Eredeti hangszereléssel csendült fel a Himnusz 2026 első perceiben Teli naptárat örökölt Ferenc pápától Xiv. Leó – Ilyen volt az új pápa első éve Jegesedik a Balaton A további adásainkat keresd a podcast.hirstart.hu oldalunkon. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
134. epizóda Vertiga bude špeciálna. Predstavíme vám dvanásť našich najdôležitejších filmových zážitkov roka 2025 a to nebude všetko. Do štúdia sme si pozvali aj skvelého hosťa, filmového režiséra Jonáša Karáska, ktorého najnovší film Dream Team prichádza o pár dní do našich kín. A ani dnes nebude chýbať tip od ľudí zo spoločnosti ESET. Tentoraz to bude slávne poľské sci-fi Sexmisia z roku 1984 na ktorom sme vyrastali. Zoznam filmov a seriálov z epizódy: Dream Team Hriešnici / Sinners Otec Predátor: nebezpečná zóna / Predator: Badlands Jedna bitka za druhou / One Battle After Another Brutalista / The Brutalist Drobná nehoda / Yek tasadef sadeh Minecraft vo filme / A Minecraft Movie Mickey 17 Franz / Franz Kafka Výber ESET - Sexmisia / Seksmisja 1670 (Netflix) Štúdio / The Studio (AppleTV+) Better Man Citová hodnota / Sentimental Value Novokain / Novocaine Adolescent / Adolescence Sirat / Sirât 2000 Meters to Andriivka See omnystudio.com/listener for privacy information.
Dit jaar liet zien hoe onrustig het digitale front is. Cyber komt steeds dichterbij: nieuws dat voorheen tot cyberniche werd gerekend, was dit jaar bovenin de nieuwsapps te lezen. Van AI die razendsnel volwassen werd tot hacks die hele bedrijven platlegden en van geopolitieke koerswijzigingen tot digitale propaganda die niet langer onder de radar bleef.Welk cybernieuws sprong eruit? Dave en Harm bespreken het, samen met Ronald Heil van KPMG, in de laatste aflevering van 2025. De cybertips: Dave: Reservist worden bij Defensie Harm: YubicoZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Our daily digital tools—browsers, apps, and smart devices—offer convenience but also expose us to hidden security risks. This guide reveals how ordinary technologies can imperil privacy and safety, focusing on three major areas: browser extensions, typo-prone website visits, and internet-connected cameras.The Hidden Spy on Your BrowserBrowser extensions, designed to block ads or save passwords, can also harvest personal data or hide malware. Researchers recently found popular Chromium extensions secretly recording entire conversations with AI chatbots such as ChatGPT and Gemini—logging prompts, responses, and timestamps, then transmitting them to outside servers. Many of these tools were deceptively labeled as privacy enhancers and featured in official stores, masking their data collection practices under carefully worded policies.Another danger, exemplified by the GhostPoster malware campaign on Firefox, showed how malicious code can bypass security. The attackers embedded it in an image file within the extension's icon—an area security software rarely scans. The code then downloaded additional payloads from remote servers in timed stages to avoid detection. Together, these examples illustrate that browser extensions can function as open doors for data theft and hidden malware, exploiting misplaced trust.When a Typo Becomes a TrapEven something as minor as mistyping a web address now carries serious risk. A "parked domain"—an inactive site often resembling a misspelled version of a popular URL—has become a common tool for cybercriminals. Once relatively harmless, these domains are now overwhelmingly malicious. According to Infoblox research, over 90% of visits to parked domains result in exposure to scams, illegal content, or automatic malware downloads, compared to less than 5% a decade ago.Simply visiting one of these pages can trigger pop-ups for fake antivirus subscriptions, redirect you to scam sites, or silently infect your device. In today's environment, a typo is no longer an inconvenience—it's a gateway to immediate compromise.The Camera That Turns on YouInternet-connected security cameras promise safety but can create severe privacy breaches when poorly secured. A massive hack in South Korea exposed footage from over 120,000 cameras in homes, clinics, and salons, which hackers later sold online. Most intrusions stemmed from weak or unchanged default passwords. This event underscores that devices we install for protection can become surveillance tools for attackers if we fail to secure them properly.Staying Smart and SafeThe dangers from compromised extensions, malicious parked domains, and insecure cameras highlight one shared truth: convenience often conceals risk. To navigate safely, users should: 1. Question their tools—research extensions or apps and limit unnecessary permissions. 2. Avoid careless mistakes—double-check URLs before pressing enter. 3. Secure devices—use strong, unique passwords and update firmware regularly.Ultimately, cyber safety depends on ongoing vigilance rather than one-time fixes. Like Santa in a playful ESET report who “tightened his security” after a fictional data breach, users too can—and must—strengthen their defenses. Staying alert, skeptical, and proactive transforms technology from a source of danger into a safer partner in modern life.
Après une année 2025 marquée par des fuites de données massives, la cybercriminalité change d'échelle. Benoît Grünemwald, expert cybersécurité chez ESET, analyse les menaces émergentes, l'usage croissant de l'IA par les attaquants et la capacité de réponse des défenseurs à l'aube de 2026.Interview : Benoît Grünemwald, expert cybersécurité chez ESETEn partenariat avec ESETSi l'on dresse le bilan de 2025 en matière de cybercriminalité, que faut-il retenir en priorité ?En 2025, ce sont avant tout des fuites de données à très grande échelle. Elles ont touché des entreprises, mais aussi des fédérations sportives françaises et des services parapublics comme France Travail. L'ampleur est telle qu'on peut considérer que presque tout le monde a été concerné, directement ou indirectement.Pourquoi dites-vous que les conséquences se feront surtout sentir en 2026 ?Parce qu'il faut du temps aux cybercriminels pour exploiter ces données. Certains sont spécialisés dans la récupération d'informations et la constitution de bases, parfois revendues sur le dark web. En recoupant plusieurs fuites, notamment grâce à l'intelligence artificielle, ils peuvent créer des profils très précis. Cela ouvre la voie à des campagnes de phishing ciblées, mais aussi à des risques bien réels dans le monde physique.L'intelligence artificielle a-t-elle marqué un tournant en 2025 pour les cyberattaquants ?Oui, clairement. On est passé de simples expérimentations à des logiciels malveillants capables de se réécrire eux-mêmes, partiellement ou totalement, grâce à l'IA. Certains malwares utilisent désormais des API pour dialoguer avec une IA hébergée sur un serveur contrôlé par l'attaquant, afin de décider quoi faire des données trouvées sur la machine de la victime. C'est un changement de paradigme important, même si ces menaces restent aujourd'hui bien détectées.On a aussi parlé de l'utilisation d'agents d'IA comme Claude par des groupes de pirates…Oui, c'est notamment documenté dans un rapport d'Anthropic sur l'utilisation détournée de Claude. Des agents spécialisés ont été utilisés pour automatiser quasiment toute la chaîne d'une attaque. Chaque agent se charge d'une étape, avec très peu d'interactions humaines. Cela réduit la complexité technique pour les attaquants, mais cela reste encore relativement encadré.Les défenseurs utilisent eux aussi l'IA. Avec quels résultats ?Les défenseurs utilisent l'IA depuis longtemps, notamment pour les tests de pénétration, ou pen tests. Récemment, une IA a même remporté un concours de hacking éthique, en identifiant des failles plus efficacement que des experts humains. C'est un signal fort sur la capacité de l'IA à renforcer la sécurité des systèmes avant que les cybercriminels ne les exploitent.-----------♥️ Soutien : https://mondenumerique.info/don
L'intelligence artificielle, la robotique, la cybersécurité et la désinformation ont marqué 2025. Dans ce dernier Hebdo de l'année, on dresse le bilan d'un millésime technologique hors norme et se projette déjà vers 2026.
133. epizóda Vertiga bude opäť bohatá na predstavenie noviniek z kín a online priestoru. Z kín nevynecháme Avatara 2, pardon Avatara 3, ktorý je vlastne to isté, čo sme videli pred tromi rokmi, stihli sme aj scenáristicky uletený psychologický triler s prvkami nechcenej paródie Pomocníčka, nevynecháme ani brazílsku dystopiu Modrou cestou a predstavíme si aj pár príšerných filmov tohto roka na čele s tínedžerským hororom Päť nocí u Freddyho 2. Streamovacia ponuka bude jasná - Na nože: Prebudenie mŕtveho muža, Fallout druhá sezóna a prezradíme vám aj pár seriálových tipov, čo si pozrieť počas Vianoc. A ani dnes nebude chýbať téma spojená so spoločnosťou ESET. Vybrali sme pre vás filmy a seriály, ktoré tematizujú technológie vo vianočných príbehoch. Zoznam filmov a seriálov z epizódy: 00:01:11 Avatar: Oheň a popol / Avatar: Fire and Ash 00:14:49 Pomocníčka / The Housemaid 00:21:17 Modrou cestou / O Último Azul 00:26:02 Päť nocí u Freddyho 2 / Five Nights at Freddy's 2 00:34:09 Eset téma - Vianočné technologické filmy a seriály 00:43:29 Na nože: Probuzení mrtvého muže / Wake Up Dead Man: A Knives Out Mystery / Netflix 00:48:59 Fallout 2. sezóna / Prime Video 00:52:09 Mimino na muške / Man vs Baby / Netflix See omnystudio.com/listener for privacy information.
Nederland gaat offensiever optreden in het cyberdomein: niet alleen verdedigen tegen digitale aanvallen, maar ook actief verstoren wanneer dat nodig is. Maar wat betekent dat concreet? Wie beslist wanneer Nederland digitaal terugslaat, met welke middelen gaan we dat doen en onder welke regels?Demissionair staatssecretaris Gijs Tuinman is in de studio om zijn ambitieuze cyberkoers van Defensie toe te lichten. Hij legt uit waarom Nederland deze koers inslaat, laat zien hoe cyber wordt geïntegreerd binnen de Nederlandse krijgsmacht en hoe hij Nederland digitaal weerbaarder wil maken.Met kritiek en vragen uit eerder afleveringen, leggen Dave en Harm de staatssecretaris ook het vuur aan de schenen: hoe verantwoord je een cyberoperatie, als die niet volledig transparant kan zijn? Hoe gaan we om met de kosten asymmetrie tussen Rusland en Europa? En hoe benen we het moordend hoge innovatietempo van o.a. drones bij?De cybertips:Rapport: ‘Tanden voor de Leeuw'Boek: ‘Ransom War' - Max SmeetsDocumentaire: ‘Ashley Madison: Sex, Lies & Scandals'Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
132. epizóda Vertiga bude opäť bohatá na predstavenie noviniek z kín a online priestoru. Z kín sme vybrali pokračovanie muzikálovej Čarodejky, ale aj vzájomne úplne odlišné filmy o vzťahoch a láske – britský uragán emócií Die My Love, estónsky rodinný konflikt Stratená sláva, ale aj americký relatívne ustrážený romantický titul Navždy s tebou. Streamovacia ponuka bude v tejto epizóde bohatá. Nevynecháme očakávané projekty Jay Kelly, či výpravný western Opustenie, ale zameriame sa aj na dokumenty – Svetlo nádeje, Lúpež v Louvre minúta po minúte a New Yorker: Storočný časopis. A ani dnes nebude chýbať tip od ľudí zo spoločnosti ESET. Tentoraz to bude americký hit 90tok Sliediči, s Robertom Redfordom v hlavnej úlohe. Zoznam filmov a seriálov z epizódy: Čarodejka: Druhá časť / Wicked: For Good Die My Love Stratená sláva / Suursugused Navždy s tebou / Eternity ESET tip: Sliediči / Sneakers Téma: Zlaté glóbusy 2026 Jay Kelly (Netflix) Svetlo nádeje / Come See Me in the Good Light (Apple TV+) Opustenie / The Abandons (Netflix) Lúpež v Louvre minúta po minúte / Louvre Heist: Minute by Minute (HBO) New Yorker: Storočný časopis / The New Yorker at 100 (Netflix) See omnystudio.com/listener for privacy information.
Geen bereik op je telefoon, het doorknippen van internetkabels en goedkope drones die steeds vaker in het Europese luchtruim worden gesignaleerd; in hun boek De Oorlog van Morgen schetsen Tim Sweijs en Martijn Kitzen een ontnuchterend, maar noodzakelijk beeld van hoe oorlog er vandaag, maar ook in de toekomst uit gaat zien.Tim legt uit hoe hybride dreigingen onze maatschappij raken, hoe Rusland aan de stoelpoten van Europa zaagt en in hoeverre we Amerika nog nodig hebben als bondgenoot. En: hoeveel tijd hebben we nog om zaken op orde te krijgen? De cybertips:Films ‘Ready Player One' en ‘House of Dynamite'Expertisecentrum online misbruik ‘Offlimits' Podcastserie ‘Ik weet je wachtwoord' en tv serie ‘Scam Alert: Trap Er Niet In!'Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
131. epizóda Vertiga bude opäť bohatá na predstavenie noviniek z kín a online priestoru. V kinách na vás čaká vynikajúci slovenský film Potopa, myšlienkovo nebanálne pokračovanie animáku Zootropolis, česká feel good dráma Neporaziteľní, ale aj americký survival Nestrácaj nádej. Ak vás zaujímajú Losy (nemyslíme tým žreby), Sny a Láska, niečo sme pre vás ešte vybrali. Na streame sa nevyhneme piatej sezóne Stranger Things, ale upozorníme aj na krásny vianočný darček pre fanúšikov Beatles. A ani dnes nebude chýbať tip od ľudí zo spoločnosti ESET. Tentoraz to bude výnimočné americké komorné sci-fi o ktorom možno ani netušíte – The Man from Earth z roku 2007. Zoznam filmov a seriálov z epizódy: Potopa Zootropolis 2 / Zootopia 2 Neporaziteľní Nestrácaj nádej / Not Without Hope AMOOSED: losia odysea Sny + Láska / Drømmer + Kjærlighet Téma ESET - Pozemšťan / The Man from Earth Stranger Things 5 (Netflix) The Beatles Anthology (Disney+) See omnystudio.com/listener for privacy information.
We hangen als Europa digitaal aan elkaar van afhankelijkheden: ons overheidsinformatiesysteem DigiD komt mogelijk in Amerikaanse handen en wanneer we ingrijpen bij het Chinese Nexperia, worden we keihard door China gestraft met een exportverbod. Het nieuws laat duidelijk zien: een wereld zonder Amerikaanse Big Tech en Chinese grondstoffen is een ondenkbare realiteit. Hoe kwetsbaar maakt die afhankelijkheid ons precies? Professor ‘Strategic Governance of Global Technologies' Haroon Sheikh neemt Dave en Harm mee door een dwarsdoorsnede van de digitale wereld en wie daar precies de touwtjes in handen heeft. Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
130. epizóda Vertiga bude opäť bohatá na predstavenie noviniek z kín a online priestoru. V kinách sme videli americkú súdnu drámu Norimberg, šialené pokračovanie fínskej akcie Sisu, netradičný mexický muzikál Bozk pavúčej ženy, švédsky koprodukčný politický triler Orly republiky, ale aj pozoruhodné domáce tituly Hranice vernosti a Letná škola, 2001. Zo streamov sme vybrali mimoriadne kvalitnú a oceňovanú americkú drámu Sny o vlakoch, brazílsku lyrickú vzťahovku Syn tisícich otcov, ale aj dánsky krimi seriál Agentka. A ani dnes nebude chýbať sci-fi tip od ľudí zo spoločnosti ESET. Tentoraz to bude seriálové spracovanie slávneho románu - Problém troch telies. Zoznam filmov a seriálov z epizódy: Norimberg / Nuremberg Sisu: Odplata / Sisu 2 Bozk pavúčej ženy / Kiss of the Spider Woman Orly republiky / Eagles of the Republic Hranice vernosti Letná škola, 2001 Téma ESET - Problém troch telies / 3 Body Problem Sny o vlakoch / Train Dreams (Netflix) Agentka / Legenden (Netflix) Syn tisícich otcov / O Filho de Mil Homens (Netflix) See omnystudio.com/listener for privacy information.
Hitom kybernetických útokov sú deep fake videá, kde sa vám prihovorí vlastný šéf. Kybernetické útoky sa množia a dokážu paralyzovať celú firmu. Umelá inteligencia im dala nový rozmer, ale takisto môže AI zvýšiť možnosti obrany pred hackermi. Mnoho firiem využíva možnosť outsourcovať služby kybernetickej bezpečnosti podobne, ako si v externom prostredí zabezpečujú služby účtovníctva, alebo právne zastupovanie. Július Selecký zo spoločnosti ESET Slovensko v rozhovore približuje, ako dnes vyzerajú najnovšie hackerské útoky: „AI zdokonalila cielené personalizované útoky na konkrétnych ľudí. Dokáže si zistiť, čomu ste sa v posledných dňoch venovali a potom pripraví phishingový e-mail doslova vám na mieru. Napríklad zverejníte na sociálnej sieti, že ste boli na nejakej konferencii. Na druhý deň vám príde email, kde sa vám niekto prihovára, že vás na tej konferencii videl, že sa chce spojiť, alebo vám posiela fotky… a potom je ľahké sa nechať nachytať a kliknúť na priložený link.“ Kritickým momentom pre firmy a ich dáta je aj migrácia do cloudu: „Firmy sa veľmi sústredia na technickú stránku migrácie, ale nezamýšľajú sa nad tým, že k dátam treba pristupovať cez internet a tomu treba prispôsobiť množstvo nastavení,“ vysvetľuje Selecký. Upozorňuje, že zvýšenú pozornosť treba venovať aj online zariadeniam v kanceláriách, ako sú kamery, klimatizácia, smart chladnička, online fitness zariadenia a podobne, ktoré útočníci vedia využiť na preniknutie do siete. Na čo treba dávať pozor, ak zamestnanci majú možnosť pracovať z domu a aké nové povinnosti prináša novela zákona o kybernetickej bezpečnosti? Odpovedá Július Selecký zo spoločnosti ESET Slovensko. Moderuje Eva Mihočková. Táto epizóda vznikla v spolupráci so spoločnosťou Eset. See omnystudio.com/listener for privacy information.
(Presented by Material Security (https://material.security): We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 73: The buddies react to Google's release of Gemini 3 and its early performance, new Chrome interface changes landing on users' machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon's latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China's CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
129. epizóda Vertiga bude opäť bohatá na predstavenie noviniek z kín a online priestoru. V kinách sme do nahrávania podcastu stihli novú verziu Muža na úteku, víťazný film tohtoročného Cinematiku Pohľad do slnka, ale aj tituly určené mladšiemu publiku – Príbehy z čarovnej záhrady a Sketch. Zo streamov sme vybrali seriálový balík zo štyroch krajín. Japonsko zastúpi akčná dráma Do posledného samuraja, Ameriku psychologický triler To monštrum vo mne, Francúzsko predchodca Nebezpečných známostí s názvom Pokušenie a pozrieme sa aj na poľský seriál inšpirovaný skutočnými udalosťami Heweliusz. Vďaka spoločnosti ESET si v nasledujúcich epizódach Vertiga predstavíme zaujímavé sci-fi tituly, ktoré vybrali priamo ľudia z Esetu. Tentoraz to bude najnovšie spracovanie Herbertovej Duny. Zoznam filmov z epizódy: Muž na úteku / The Running Man Pohľad do slnka / In die Sonne schauen Príbehy z čarovnej záhrady Sketch Téma ESET: Dune: Part One/Two Do posledného samuraja / Last Samurai Standing (Netflix) To monštrum vo mne / The Beast In Me (Netflix) Pokušenie / The Seduction (HBO Max) Heweliusz (Netflix) See omnystudio.com/listener for privacy information.
De oorlog komt dichterbij – fysiek én digitaal. Terwijl drones boven Europa worden gesignaleerd en de overheid miljoenen Nederlanders oproept zich voor te bereiden op noodsituaties, bezoeken Dave en Harm de NEDS: het grootste defensie-evenement van de Benelux. Tussen drone-demonstraties en ingenieuze cyberstands spreken ze met drie zwaargewichten uit het veld: voormalig MIVD-directeur Pieter Cobelens, KPMG-cyberpartner Hokkie Blogg en drone-innovator Martijn Hädicke.Hoe staan we er volgens hen voor wat betreft onze digitale weerbaarheid? Welke rol gaan AI, drones en nieuwe communicatietechnologieën de komende jaren spelen, nu geopolitieke conflicten steeds sneller lijken te veranderen? Is de samenwerking tussen overheid, bedrijfsleven en defensie daarmee dan ook crucialer dan ooit? Luister vanaf de beursvloer mee hoe men probeert de toekomst van onze veiligheid te garanderen. Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
In this edition of Between Two Nerds Tom Uren and The Grugq talk about the strategic “logic” of Russian wiper attacks on the Ukrainian grain sector. This episode is also available on Youtube. Show notes ESET report Soesanto and Gajos at Lawfare
128. epizóda Vertiga bude opäť bohatá na predstavenie noviniek z kín a online priestoru. Zrecenzujeme americké filmy Podfukári 3 a ambicióznu drámu Drvič v ringu. Nevynecháme ale ani kvalitné česko-slovenské dokumenty Virtuálna priateľka a Chvilky naděje a pridáme aj dvojicu nemeckých titulov, ktoré nás vracajú do 20 storočia – Riefenstahl a Kolín 75. Zo streamov sme vybrali to najzaujímavejšie – očakávané nové spracovanie Frankensteina, originálne sci-fi Pluribus, politický seriál Rana bleskom, ale aj uvoľnený pohľad na život v Kalifornii očami generácie Z s názvom Milujem LA. Vďaka spoločnosti ESET si v nasledujúcich epizódach Vertiga predstavíme zaujímavé sci-fi tituly, ktoré vybrali priamo ľudia z Esetu. Tentoraz to bude kultový film, ktorý predbehol svoju dobu - Vojnové hry. Zoznam filmov a seriálov z epizódy: Podfukári 3 / Now You See Me: Now You Don't Drvič v ringu / The Smashing Machine Virtuálna priateľka Chvilky naděje Riefenstahl Kolín 75 / Köln 75 Téma ESET: Vojnové hry / WarGames (1983) Frankenstein (Netflix) Pluribus (AppleTV+) Rana bleskom / Death by Lightning (Netflix) Milujem LA / I Love LA (HBO Max) See omnystudio.com/listener for privacy information.
Noord-Korea staat bekend als de meest afgesloten staat ter wereld – maar hoe geïsoleerd is het land werkelijk? Nu Noord-Koreaanse soldaten opduiken aan het Russische front, werpt dat vragen op over Pyongyangs rol op het wereldtoneel.Korea-deskundige Remco Breuker onthult hoe verborgen netwerken, internationale allianties en gigantische cryptohacks het regime miljarden opleveren. Tech-ondernemer Simon Wijckmans schuift aan om te vertellen over zijn ervaring met frauduleuze sollicitanten, die met AI, green screens en valse identiteiten Westerse bedrijven proberen binnen te dringen. Wat hebben zij met Noord-Korea te maken? Je hoort het in deze aflevering van Het Digitale Front!De cybertips van deze week:Podcast: Lazarus - BBCLiveblog: hybride oorlog - De VolkskrantArtikel: ‘How North Korean IT workers leverage AI and vulnerable Americans to infiltrate US companies' - CNNZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
ConnectWise has announced enhancements to its Ozzio platform, which now includes expanded third-party patching for over 7,000 applications, improvements to the professional services automation (PSA) user experience, and advanced robotic process automation (RPA) capabilities. These updates aim to address security vulnerabilities in widely exploited applications and streamline operations for managed service providers (MSPs). The new features are set to improve operational efficiency and security, with the expanded patching available immediately and RPA features expected to roll out in the coming months.In conjunction with these updates, ESET has integrated its ESET Protect platform with ConnectWise Ozzio, allowing for one-click deployment of security management tools. This integration is designed to enhance the efficiency of security tasks for MSPs, enabling them to meet legal and insurance requirements more effectively. Additionally, ConnectSecure has introduced AI-powered vulnerability management reports that prioritize risks based on business impact rather than just technical severity, further supporting MSPs in delivering proactive risk assessments.OpenAI has surpassed 1 million business customers, marking it as the fastest-growing business platform in history. A Wharton study indicates that 75% of enterprises using AI technologies report a positive return on investment. Meanwhile, Google has launched Gemini AI tools for stock traders and improved hurricane prediction capabilities through its DeepMind technology, showcasing the growing integration of AI across various sectors, including finance and weather forecasting.For MSPs and IT service leaders, these developments underscore the importance of integrating advanced security and AI capabilities into their service offerings. As the landscape shifts towards cyber resilience and AI-driven solutions, providers must adapt by leveraging these tools to enhance their operational efficiency and client services. The focus on measurable outcomes, such as trust and risk management, will be crucial for maintaining competitive advantage in an increasingly automated environment. Four things to know today00:00 At IT Nation Connect, ConnectWise Focuses on Asio Enhancements While Ecosystem Partners Deliver the Bigger Innovation05:37 N-able Rebrands Its Future: Strong Earnings and AI-Fueled Pivot Toward Cyber Resilience08:31 From ChatGPT to Hurricanes: How AI's Expansion Is Turning Tools Into Core Business Systems11:14 Trust, Transparency, and Transformation: How AI Acceleration Is Forcing Leaders to Rethink Human Metrics This is the Business of Tech. Supported by: https://mailprotector.com/mspradio/
127. epizódaVertigabude opäť bohatá na predstavenie noviniek z kín a online priestoru. Poďme rovno do kín. Stihli sme nových Podfukárov, Predátora, ale aj britskú drámu Cesta života, či strihový a precízne vystavaný dokumentárny film Orwell: 2 + 2 = 5. Nezabudneme ale ani na kino uvedenie Návratu do budúcnosti, ktorý má presne 40 rokov od svojej premiéry. Zo streamov sa pozrieme na snahu pokračovať s príbehom Witchera, ale aj na nový seriálový triler Cesta k pravde. Tešíme sa aj na to, že vďaka spoločnosti ESET si v nasledujúcich epizódach Vertiga predstavíme zaujímavé sci-fi tituly, ktoré vybrali priamo ľudia z firmy, ktorej názov je odvodený od mena staroegyptskej bohyne. Zoznam filmov z epizódy: Podfukári 3 / Now You See Me: Now You Don't Predátor: nebezpečná zóna / Predator: Badlands Cesta života / The Salt Path Orwell: 2 + 2 = 5 Návrat do budúcnosti / Back to the Future Téma ESET choice / Horizont udalostí / Event Horizon Cesta k pravde / Down Cemetery Road (AppleTV+) The Witcher 4 (Netflix) See omnystudio.com/listener for privacy information.
Kybernetická bezpečnosť už dávno nie je len o antivíruse a heslách. Hoci sa firmy na Slovensku v základnej hygiene zlepšili, mnohé stále podceňujú sofistikovanejšie hrozby. Často investujú do pokročilých technológií, no nemajú kvalifikovaných ľudí, ktorí by ich vedeli správne vyhodnocovať a manažovať. Prečo je dôležité oddeliť IT od bezpečnosti a aké sú možnosti pre firmy, ktoré si vlastný bezpečnostný tím nemôžu dovoliť?V novom dieli podcastu SHARE sa moderátor Maroš Žofčin rozpráva s Júliusom Seleckým, Solution Architectom spoločnosti Eset, o reálnom stave kybernetickej bezpečnosti v slovenských firmách, o najčastejších chybách a o riešeniach, ako je manažovaná detekcia a reakcia (MDR). Podcast prinášame v spolupráci so spoločnosťou Eset.Pripravte sa na budúcnosť s knihou od redaktorov Živé.sk „Umelá inteligencia: Pripravte sa na budúcnosť“. Teraz aj ako ebook! TIP: https://zive.aktuality.sk/clanok/0RfdZVW/nahliadnite-do-buducnosti-vydavame-knihu-o-umelej-inteligencii/V podcaste hovoríme aj o týchto témach:V čom sa slovenské firmy zlepšili (heslá, aktualizácie) a čo stále podceňujú.Prečo by IT oddelenie a bezpečnostné oddelenie mali byť striktne oddelené.Analýza rizík: Ako majú firmy identifikovať, čo je pre ich biznis kľúčové.Čo sú EDR a XDR systémy a prečo bežný antivírus už nestačí.Aké sú možnosti pre firmy, ktoré nemajú vlastných bezpečnostných expertov (MDR).Téme sa venujeme aj v článku: https://zive.aktuality.sk/clanok/nmdWnCW/firmy-maju-antivirusy-no-chyba-im-tato-klucova-vec-mnohe-na-to-doplatili/ Podcast SHARE pripravuje magazín Živé.sk.
In this episode of Cybersecurity Today, host David Shipley covers the latest updates from the Pwn2Own 2025 event in Ireland, where top hackers earned over $1 million for uncovering 73 zero-day vulnerabilities. Despite significant hype, AI's impact on cybersecurity remains limited. We also dive into a critical Microsoft WSUS flaw under active exploitation and its implications for U.S. government cyber defenses amid a federal shutdown. Lastly, ESET reports reveal North Korea's increased cyber espionage targeting European drone manufacturers. Stay informed on the ever-evolving landscape of cybersecurity threats and defenses. 00:00 Introduction and Headlines 00:29 Pwn to Own 2025 Highlights 02:35 AI's Role in Cybersecurity 03:43 Microsoft's Critical WSUS Vulnerability 07:24 US Government Shutdown and Cyber Attacks 10:04 North Korean Cyber Espionage 12:46 Conclusion and Call to Action
Mobil uygulamalar, konumunuzu siz fark etmeden mi takip ediyor? ESET Ürün ve Pazarlama Müdürü Can Erginkurban, Uber'den Instagram'a kadar popüler uygulamaların lokasyon bilgilerini nasıl kullandığını ve Apple'ın Notification Trigger sisteminin perde arkasını Atıf Ünaldı ile Netizen'de anlatıyor.
Slovakia Today, English Language Current Affairs Programme from Slovak Radio
Ben Pascoe attended the Eset Slovak Scientist of the Year awards held recently in Bratislava. He brings you interviews with founders, jury members, Slovak scientists and even a former president, as well info on many of the great scientists in Slovakia today.
Zdeněk Ráčil opustil kampus prestižní fakultní nemocnice a po dvaceti letech ve vrcholové medicíně se rozhodl stát se praktikem na malé vesnici a ve volném čase pomáhat v Ugandě. Právě díky němu je ve městě Buikwe nejlepší klinika pro srpkovitou anémii a africké děti si ho podmanily natolik, že se za nimi vrací několikrát ročně.Partnerem podcastu je ESET - zaměřuje na digitální bezpečnost domácností i firem a právě nyní mají akci 3 za 2 – tři roky ochrany za cenu dvou. Takže pokud chcete začít brát digitální bezpečnost vážně. Mrkněte na eset.cz
If you like what you hear, please subscribe, leave us a review and tell a friend!Authorities and security firms are warning about a variety of cyber threats impacting users and organizations worldwide. The FBI flagged a spoofed IC3 website, while macOS users are targeted by a widespread infostealer campaign. SonicWall urged users to reset credentials and European airports experienced check-in disruptions due to a cyberattack while a verified Steam game reportedly stole donations. Canadian authorities dismantled the TradeOgre exchange, seizing $40 million in cryptocurrency and ESET reported collaboration between two of the Kremlin's most active hack groups.
L'été a été noir sur le front de la cybersécurité. Benoît Grunemwald, expert cybersécurité, fait le point sur les dernières cybermenaces. Au programme : des attaques de grande ampleur, une nouvelle technique de piratage via de faux captchas, et l'émergence d'un ransomware boosté à l'intelligence artificielle.En partenariat avec ESETDerrière les fuites de données qui ont touché France Travail, Air France-KLM, Orange ou Bouygues Télécom, des techniques toujours plus sournoises : hameçonnage, infostealers, ingénierie sociale et compromission de comptes employés. Benoît Grunemwald lève le voile sur ces méthodes redoutables — y compris une arnaque inédite qui détourne les captchas pour pousser l'utilisateur à installer lui-même un logiciel malveillant via une simple ligne de commande.Nous parlons également de PromptLock, un ransomware de nouvelle génération capable de s'adapter en temps réel grâce à l'intelligence artificielle, rendant la détection et la prévention encore plus difficiles.
Dozens of online influencers are using their platform to spread financial literacy, which continues to have a growing impact on younger generations looking to get into investing, saving and making more money.And although cybercriminals have been around for decades, they're capitalizing on social media users with the help of artificial intelligence in the form of deep fakes or fraudulent advertisements to get your money and information. Host Mike Eppel speaks to Tony Anscombe, chief security evangelist at ESET to discuss the signs to look out for, and how to protect yourself and your wallet from being one of the millions of cybercrime victims. We love feedback at The Big Story, as well as suggestions for future episodes. You can find us:Through email at hello@thebigstorypodcast.ca Or @thebigstoryfpn on Twitter
“What do you call a haunted house in Egypt?”Isis. Protector of Pharaohs. Guardian of the Dead. Goddess of Magic. Perhaps the most influential of all Egyptian deities. So, what's the deal with that whole getting rid of Ra to put her husband on the throne, thing? Not very Ma'at of her, if you ask us. Other topics include the fear-amids, mythological details regarding the timing of the Snake Bite Incident, a trouble pattern of choices made by Rick Riordan, where the name “Eset” comes from in SMITE, why aesthetic plays a big role in which Egyptian gods get modern appearances, the first weekly live-action American superhero show with a female lead, and some out of the blew but not uncalled for dunks on Black Adam (2022). Content Warning: This episode contains mentions of and conversations about death, the afterlife, dismemberment, necrophilia, and harm to a child. Spoilers for SMITE and The Secrets of IsisLearn more about the Idaho Food Bank: https://idahofoodbank.org/Come see us at Boise Comic Arts Festival!! https://www.boisepubliclibrary.org/using-the-library/boise-comic-arts-festival/Bemused bonus episode available NOW on Patreon! https://www.patreon.com/musesofmythologyAbout UsMuses of Mythology was created and co-hosted by Darien and DJ Smartt.Our music is Athens Festival by Martin Haene. Our cover art is by Ranpakoka. Find him on Instagram @Ranpakoka Love the podcast? Support us on Patreon and get instant access to bloopers, outtakes, and bonus episodes! Patreon.com/musesofmythologyGet you hands on podcast merch at Musesofmythology.com/merchFind us @MusesOfMyth on Instagram. Find all of our episodes and episode transcripts at MusesOfMythology.com----------------------- Support the showNo portion of this episode may be used for AI training purposes or to create derivative works without express written permission from the creators and co-hosts Darien Smartt or Davis Smartt.
The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities. 20 suspects are arrested in a major international CSAM takedown. Hackers exploit a critical flaw in Roundcube webmail. Today's guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black & Veatch, exploring how organizations can close the cyberattack readiness gap. ChatGPT logs are caught in a legal tug-of-war. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black & Veatch. Ian joins us to explore how organizations can close the cyberattack readiness gap in industrial environments—especially as cyber threats grow more sophisticated and aggressive. Selected Reading Department Files Civil Forfeiture Complaint Against Over $7.74M Laundered on Behalf of the North Korean Government (U.S. Department of Justice) FBI: BADBOX 2.0 Android malware infects millions of consumer devices (Bleeping Computer) Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens (Cyber Security News) Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign (The Record) CISA reports critical flaw in Hitachi Energy Relion devices (Beyond Machines) Critical security vulnerabilities discovered in Acronis Cyber Protect software (Beyond Machines) Cisco Patches Critical ISE Vulnerability With Public PoC (SecurityWeek) Police arrests 20 suspects for distributing child sexual abuse content (Bleeping Computer) Hacker selling critical Roundcube webmail exploit as tech info disclosed (Bleeping Computer)– mentioning this in the Briefing OpenAI slams court order to save all ChatGPT logs, including deleted chats (Ars Technica) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices