bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

254
active users

#eset

0 posts0 participants0 posts today
securityaffairs<p>An <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> group exploited <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> flaw to execute <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a><br><a href="https://securityaffairs.com/176364/security/an-apt-group-exploited-eset-flaw-to-execute-malware.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176364/sec</span><span class="invisible">urity/an-apt-group-exploited-eset-flaw-to-execute-malware.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Opalsec :verified:<p>Hey <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> pros! 👋 Ready to dive into the latest threats and breaches making headlines? </p><p>Our latest blog post is packed with need-to-know info to keep you ahead of the curve. </p><p>🗞️ <a href="https://opalsec.io/daily-news-update-thursday-march-27-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-t</span><span class="invisible">hursday-march-27-2025-australia-melbourne/</span></a></p><p>Here's a quick rundown of what's inside:</p><p>🕵️‍♂️ FamousSparrow's Return: The Chinese government-backed hacking group is back, targeting organizations in North America. Important distinction: ESET insists on tracking them separately from Salt Typhoon. Remember to prioritize TTPs and IOCs/IOAs accordingly!</p><p>🗄️ RedCurl's Ransomware Twist: This corporate espionage group is now deploying "QWCrypt" ransomware, targeting Hyper-V servers. Phishing emails with malicious IMG attachments are the initial attack vector.</p><p>😬 StreamElements Data Breach: A third-party service provider suffered a breach, exposing data of 210,000 customers.!</p><p>🏛️ NSW Court System Data Theft: Sensitive documents, including AVOs, were stolen from the NSW Online Registry website. This could have serious consequences for victims of domestic violence.</p><p>👨‍🎓 NYU Website Defacement: A hacker compromised NYU's website, leaking personal data of over 1 million students. Even with good intentions, the collateral damage is unacceptable.</p><p>💰 Defense Contractor Fined: MORSE Corp will pay millions for failing to meet federal cybersecurity requirements. Third-party risk management is crucial!</p><p>🤖 Atlantis AIO Automates Credential Stuffing: This new platform automates credential stuffing attacks against 140 online services. Stay vigilant against brute force attacks!</p><p>🚨 Chrome Zero-Day Exploited: Google patched a zero-day vulnerability exploited in espionage campaigns targeting Russian organizations. Keep your browsers updated!</p><p>👦 UK Warns of 'Com Networks': The UK's NCA is warning of a growing threat from online networks of teenage boys who are "dedicated to inflicting harm and committing a range of criminality." A very worrying trend that we need to be aware of.</p><p>Ready for the full scoop? Read the full blog post here 👉 <a href="https://opalsec.io/daily-news-update-thursday-march-27-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-t</span><span class="invisible">hursday-march-27-2025-australia-melbourne/</span></a> </p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataPrivacy</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/FamousSparrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FamousSparrow</span></a> <a href="https://infosec.exchange/tags/RedCurl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedCurl</span></a> <a href="https://infosec.exchange/tags/StreamElements" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StreamElements</span></a> <a href="https://infosec.exchange/tags/NSWCourts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSWCourts</span></a> <a href="https://infosec.exchange/tags/NYU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NYU</span></a> <a href="https://infosec.exchange/tags/MORSECorp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MORSECorp</span></a> <a href="https://infosec.exchange/tags/AtlantisAIO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AtlantisAIO</span></a> <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://infosec.exchange/tags/ComNetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComNetworks</span></a> <a href="https://infosec.exchange/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://infosec.exchange/tags/CybersecurityThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityThreats</span></a> <a href="https://infosec.exchange/tags/InfoSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecurity</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/PrivacyMatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyMatters</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://infosec.exchange/tags/ThreatActor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatActor</span></a> <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <a href="https://infosec.exchange/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://infosec.exchange/tags/NIST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NIST</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://infosec.exchange/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a></p>
OTX Bot<p>Operation FishMedley targeting governments, NGOs, and think tanks</p><p>ESET researchers have uncovered a global espionage operation called Operation FishMedley, conducted by the FishMonger APT group, which is operated by the Chinese contractor I-SOON. The campaign targeted governments, NGOs, and think tanks across Asia, Europe, and the United States during 2022. The attackers used implants like ShadowPad, SodaMaster, and Spyder, which are common or exclusive to China-aligned threat actors. The operation involved sophisticated tactics including lateral movement, credential theft, and custom malware deployment. Seven victims were identified across various countries and sectors. The analysis provides technical details on the malware used, initial access methods, and command and control infrastructure.</p><p>Pulse ID: 67dd406f6ba9eecd280aa95e<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67dd406f6ba9eecd280aa95e" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67dd4</span><span class="invisible">06f6ba9eecd280aa95e</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-21 10:33:19</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Asia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Asia</span></a> <a href="https://social.raytec.co/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://social.raytec.co/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/ISoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISoon</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/ShadowPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShadowPad</span></a> <a href="https://social.raytec.co/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedStates</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
ITSEC News<p>Microsoft: 6 Zero-Days in March 2025 Patch Tuesday - Microsoft today issued more than 50 security updates for its various Windows opera... <a href="https://krebsonsecurity.com/2025/03/microsoft-6-zero-days-in-march-2025-patch-tuesday/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/03/mi</span><span class="invisible">crosoft-6-zero-days-in-march-2025-patch-tuesday/</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2025-24983 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2025-24984 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2025-24985 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2025-24991 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2025-24993 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2025-26633 <a href="https://schleuss.online/tags/securitytools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitytools</span></a> <a href="https://schleuss.online/tags/filipjur%C4%8Dacko" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>filipjurčacko</span></a> <a href="https://schleuss.online/tags/timetopatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>timetopatch</span></a> <a href="https://schleuss.online/tags/adambarnett" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adambarnett</span></a> <a href="https://schleuss.online/tags/rapid7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rapid7</span></a> <a href="https://schleuss.online/tags/eset" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eset</span></a></p>
Enter504 Periódico Digital<p><a href="https://mastodon.social/tags/Tecnologia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tecnologia</span></a> Falso CapCut con IA, instala software espía <a href="https://mastodon.social/tags/Virus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Virus</span></a> <a href="https://mastodon.social/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://mastodon.social/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <br>👇 <a href="https://enter504.com/falso-capcut-con-ia-instala-software-espia/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">enter504.com/falso-capcut-con-</span><span class="invisible">ia-instala-software-espia/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.space/@topher" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>topher</span></a></span> <a href="https://infosec.space/tags/Antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Antivirus</span></a> is for the most part <a href="https://infosec.space/tags/Scareware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scareware</span></a> aimed at scamming <a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechIlliterates</span></a> which at best only works against kniwn threats and at worst is literal <a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> in and of itself selling user data to bad actors.</p><ul><li>There are commercial AV options for major distros, like <a href="https://infosec.space/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <a href="https://www.eset.com/ie/" rel="nofollow noopener noreferrer" target="_blank">offers</a> for all 3 big Desktop ones: @RedHat, <a href="https://infosec.space/tags/SUSE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SUSE</span></a> &amp; <a href="https://infosec.space/tags/UbuntuLTS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UbuntuLTS</span></a>...</li></ul><p>As for the rest one can just scan <a href="https://infosec.space/tags/Fileservers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fileservers</span></a> regularly and do so on <a href="https://infosec.space/tags/Mailservers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mailservers</span></a>, but existing tools to enforce quick and early updates on those distros already do most of the heavy lifting re: <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a>... </p><p><a href="https://infosec.space/tags/JustSayling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JustSayling</span></a></p>
O Slovensku<p>Cieľom podvodníkov je vybudovať si dôveru u náhodnej osoby v priebehu niekoľkých týždňov alebo mesiacov, často pod zámienkou romantického záujmu. </p><p>Tón: mierne negatívny<br><a href="https://rockosbasilisk.com/tags/slovakia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>slovakia</span></a> <a href="https://rockosbasilisk.com/tags/gdelt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gdelt</span></a> <a href="https://rockosbasilisk.com/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://rockosbasilisk.com/tags/podvod" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podvod</span></a> <a href="https://rockosbasilisk.com/tags/eset" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eset</span></a><br> <a href="https://l.rockosbasilisk.com/YsWN4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">l.rockosbasilisk.com/YsWN4</span><span class="invisible"></span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> detailed a flaw that could allow a bypass of the <a href="https://infosec.exchange/tags/Secure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Secure</span></a> <a href="https://infosec.exchange/tags/Boot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Boot</span></a> in <a href="https://infosec.exchange/tags/UEFI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEFI</span></a> systems<br><a href="https://securityaffairs.com/173175/security/flaw-bypass-secure-boot-in-uefi-systems.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/173175/sec</span><span class="invisible">urity/flaw-bypass-secure-boot-in-uefi-systems.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
𝙳𝚊𝚗𝚒𝚎𝚕𝚎 𝙼𝚒𝚌𝚌𝚒 🇪🇺<p><span class="h-card" translate="no"><a href="https://mastodon.uno/@prealpinux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>prealpinux</span></a></span> <span class="h-card" translate="no"><a href="https://diggita.com/c/linux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>linux</span></a></span> Ad essere precisi, <a href="https://mastodon.uno/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> consiglia l'installazione di una distribuzione <a href="https://mastodon.uno/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> come una "buona opzione" tout court, aggiungendo poi "soprattutto per l’hardware più vecchio". Dall'articolo di PI, invece, sembra che l'opzione Linux sia suggerita *solo* in relazione all'hardware datato (una sorta di soluzione di ultima istanza). <a href="https://mastodon.uno/tags/softwarelibero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarelibero</span></a> <a href="https://mastodon.uno/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p><p><a href="https://www.eset.com/de/about/presse/pressemitteilungen/pressemitteilungen/security-fiasko-32-millionen-computer-in-deutschland-laufen-noch-mit-windows-10/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eset.com/de/about/presse/press</span><span class="invisible">emitteilungen/pressemitteilungen/security-fiasko-32-millionen-computer-in-deutschland-laufen-noch-mit-windows-10/</span></a></p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> recommends installing <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> if your unsupported <a href="https://fosstodon.org/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> 11 PC can't update from 10 </p><p><a href="https://www.neowin.net/amp/eset-recommends-installing-linux-if-your-unsupported-windows-11-pc-cant-update-from-10/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">neowin.net/amp/eset-recommends</span><span class="invisible">-installing-linux-if-your-unsupported-windows-11-pc-cant-update-from-10/</span></a></p>
Linux Is Best<p><span>My antivirus of choice is no longer available in the United States - Kaspersky.<br><br>I do not suggest ESET / NOD32. I have been burned by that company so many times, that they remind me of Windows and their poor productive activation.<br><br>For example, years ago, I bought their Linux edition, only to discover 1 week later, they discontinued the product. Google still had indexed their Linux page, and they never took the page offline, nor stopped accepting orders, and so I paid for 2 years worth of service, which ESET refused to refund or honor.<br><br>I was wrongfully accused of having ESET on more than one device, numinous time. Their own support forums are filled with people, asking why their products fail to activate or fail to update. That seems to be a running theme with them.<br><br>This really only leaves BitDefender (Windows, macOS, Android, iOS)<br><br>They do not have a consumer Linux build (and their business build is insanely priced), but for everyone else, they are who I would recommend. <br><br>1 of 2<br><br></span><a href="https://kitty.social/tags/ESET" rel="nofollow noopener noreferrer" target="_blank">#ESET</a> <a href="https://kitty.social/tags/Nod32" rel="nofollow noopener noreferrer" target="_blank">#Nod32</a> <a href="https://kitty.social/tags/AntiVirus" rel="nofollow noopener noreferrer" target="_blank">#AntiVirus</a> <a href="https://kitty.social/tags/Kaspersky" rel="nofollow noopener noreferrer" target="_blank">#Kaspersky</a> <a href="https://kitty.social/tags/BitDefender" rel="nofollow noopener noreferrer" target="_blank">#BitDefender</a> <a href="https://kitty.social/tags/AntiVirus" rel="nofollow noopener noreferrer" target="_blank">#AntiVirus</a></p>
Aryeh Goretsky<p>I just had my 19th anniversary at <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a>, and passed my 35 year anniversary in the AV industry a couple of months ago, which started at <a href="https://infosec.exchange/tags/McAfee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>McAfee</span></a>. </p><p>Still fighting the good fight, and thinking about how the industry has changed over the decades... A long way from floppy diskette boot sector infectors to EFI system partition infectors on solid state drives. Well... maybe not so far after all. :)</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.space/@topher" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>topher</span></a></span> nit used it yet but <a href="https://infosec.space/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> AFAICT are one of tue few vendors that ain't falling under some <a href="https://infosec.space/tags/cyberfacist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberfacist</span></a> bs. from either the <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a>, <em>"<a href="https://infosec.space/tags/PRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PRC</span></a>"</em> or <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a>... </p><ul><li>I did took a look into it at an employer as part of planning a new <a href="https://infosec.space/tags/ManagedIT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ManagedIT</span></a> offering based on <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://infosec.space/tags/Desktop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Desktop</span></a>|s...</li></ul><p>I should give it a closer look.</p>