• Home
  • About
  • Products
  • Services
  • Partnership
  • Newsroom
  • Contact Us
China-aligned Evasive Panda leverages religious festival to target and spy on Tibetans, ESET Research discovers

China-aligned Evasive Panda leverages religious festival to target and spy on Tibetans, ESET Research discovers

by esetphmarketing | Mar 8, 2024 | Cybersecurity News

ESET Research discovered a cyberespionage campaign that leverages the Monlam Festival — a religious gathering — to target Tibetans in several countries and territories. ESET attributes this campaign with high confidence to the China-aligned Evasive Panda Advanced...
Vulnerabilities in business VPNs under the spotlight

Vulnerabilities in business VPNs under the spotlight

by esetphmarketing | Mar 6, 2024 | Cybersecurity News

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk Márk Szabó •  WeLiveSecurity.com •  6 min. read Virtual Private Network (VPN)...
Keeping encryption secure from BitLocker sniffing

Keeping encryption secure from BitLocker sniffing

by esetphmarketing | Mar 1, 2024 | Cybersecurity News

Recently, the YouTube channel stacksmashing uploaded a video on breaking the built-in encryption in Windows, essentially bypassing Windows Disk Encryption on most devices using Microsoft’s globally dominant operating system with a cheap $10...
Boost Your Social Media Savvy: Top 10 Things to Keep Private!

Boost Your Social Media Savvy: Top 10 Things to Keep Private!

by esetphmarketing | Feb 29, 2024 | Cybersecurity News

Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk. Phil Muncaster | WeLiveSecurity.com | 5 min. read Hundreds of millions of us log on to our favorite social media sites every day. We...
Everything you need to know about IP grabbers

Everything you need to know about IP grabbers

by esetphmarketing | Feb 28, 2024 | Cybersecurity News

You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission. Márk Szabó | WeLiveSecurity.com | 6 min. read A common message that any user of a social...
« First«...678910»

Recent Posts

  • Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
  • Is your LinkedIn profile revealing too much?
  • Debunking five myths about business encryption
  • How safe and secure is your iPhone really?
  • Watch your steps: How to manage your digital footprint

Recent Comments

No comments to show.
ADDRESS
Unit 2A J&L building, #23 Matalino st. Central District, Diliman,
Quezon City, Metro Manila, Philippines 1100

CONTACT NUMBERS
+632 8657 2257 / +63 915 341 0480

SALES EMAIL
sales@b1g2.io

SUPPORT EMAIL
wecare@b1g2.io

Our Products

ESET Home Edition

ESET Business Solutions

ESET Technology Alliance

Our Services

Vulnerability Assessment

Penetration Testing

VAPT Services

Quicklinks

Contact Us

Terms of Use

Privacy Policy

Manage Cookies

Copyright © 2026 B1G2 Technologies International Inc.  All Rights Reserved. 
Website developed by: i4 Asia Incorporated.

