Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams…
Development
Take a moment to think beyond our current capabilities and consider what might come next in the grand story of…
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses Source: Read More
By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable…
Listen up, this is sure to be music to your ears – a few minutes spent securing your account today…
While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT…
Here’s what’s been hot on the AI scene over the past 12 months, how it’s changing the face of warfare,…
The group’s Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as…
ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute…
ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON Source: Read More
ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor,…
ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play Source: Read More
ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR…
Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first…
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will…
Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage Source: Read More
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it’s a wrap on…
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how…
The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie…
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to…