The who, where, and how of APT attacks – Week in security with Tony Anscombe
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader…
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader…
Russia-linked Turla APT allegedly used two new backdoors, named Lunar malware and LunarMail, to target European government agencies. ESET researchers…
When asked what makes this an “emotional support squid” and not just another stuffed animal, its creator says: They’re emotional…
Cybercriminals are trafficking Docusign assets that allow for easy extortion and business email compromise.
Instead of online contraband, the website now asks anyone with information that could help with the investigation to contact authorities.
A vulnerability in the HNAP login request protocol that affects a family of devices gives unauthenticated users root access for…
CISOs are now considered part of the organizational executive leadership and have both the responsibility and the opportunity to drive…
The nation amends its Cybersecurity Act, giving its primary cybersecurity agency more power to regulate critical infrastructure and third parties,…
SANS Institute experts weigh in on the top threat vectors faced by enterprises and the public at large.
CVE-2024-30051, under active exploit, is the most concerning out of this month's Patch Tuesday offerings, and already being abused by…