As ransomware rages on, no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”.
As the number of softwarevulnerabilities continues to increase, delaying or skipping security updates could cost your ...
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a ...
Some Minecraft “hacks” don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
Never rely on just a password, however strong it may be. This October, make it a habit to enable multi-factor authentication ...
IT security is often regarded as the “Department of No” and sometimes it’s easy to see why. In a world of escalating cyber-risk, expanding attack surfaces and a fast-growing cybercrime economy, ...
It’s time to recognize the gravity of cyber risk, put security front and center and, ultimately, turn awareness into action.
Following OceanLotus’ activities is taking a tour in the world of deception. This group is known to lure victims by forging appealing documents to entice potential victims into executing the group’s ...
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results