The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?
Une fois encore, les chiffres mettent en lumière une réalité peu rassurante : le réflexe de choisir des mots de passe ...
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools ...
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks. Let’s take a closer look.
Pour les entreprises, il n’est plus questions de savoir si une attaque va survenir, mais plutôt quand. Alors comment se ...
Si vos données se trouvent sur le dark web, cette partie immergée et obscure du web, ce n'est probablement qu'une question de ...
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow.
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.
To misquote Benjamin Franklin, nothing is certain in this world except for death, taxes and scammers. Unfortunately, with tax filing season now in full swing, the fraudsters are also out in force, ...
In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new malware on the same system, none of ...
Black Hat Europe 2025 opened with a presentation by Max Smeets of Virtual Rotes titled ‘Inside the Ransomware Machine’. The talk focused on the LockBit ransomware-as-a-service (RaaS) gang and Max’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results