The calm before the ransom: What you see is not all there is
A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
Results driven. Results delivered.
A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
An attack is what you see, but a business operation is what you’re up against
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.
Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.
Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan