How fraudsters abuse Google Forms to spread scams
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
Results driven. Results delivered.
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better.
Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead
Here’s what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What’s the right antidote to cyber-risk?
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results
ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it’s a wrap on another month filled with impactful cybersecurity news
The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie ahead for us
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.