Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
Results driven. Results delivered.
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
Identity is effectively the new network boundary. It must be protected at all costs.
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook