News

Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to ...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection ...
La découverte de PromptLock révèle comment l’exploitation malveillante de modèles d’IA peut doper l’efficacité des ...
Les infostealers (logiciels de vol de données) alimentent directement l'usurpation d'identité, le détournement de comptes et ...
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS ...
This may include unusual mood swings, low self-esteem, a lack of interest in hobbies, big changes in screen time (more or ...
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats.
BladedFeline: Whispering in the dark ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig ...
ESET took part in a coordinated global operation to disrupt Lumma Stealer. ESET provided technical analysis and statistical information, and extracted essential data from tens of thousands of ...
Your iPhone isn’t necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
So your friend has been hacked: Could you be next? When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.