Operation FishMedley Security ESET researchers detail a global espionage operation by FishMonger, the… rooter April 10, 2025 1 min read 0
MirrorFace updates toolset, expands targeting to Europe Security The group’s Operation AkaiRyū begins with targeted spearphishing emails that… rooter April 10, 2025 1 min read 0
AI’s biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1) Security Here’s what’s been hot on the AI scene over the… rooter April 10, 2025 1 min read 0
Shifting the sands of RansomHub’s EDRKillShifter Security ESET researchers discover new ties between affiliates of RansomHub and… rooter April 10, 2025 1 min read 0
When IT meets OT: Cybersecurity for the physical world Security While relatively rare, real-world incidents impacting operational technology highlight that… rooter April 10, 2025 1 min read 0
Don’t let cybercriminals steal your Spotify account Security Listen up, this is sure to be music to your… rooter April 10, 2025 1 min read 0
AI-driven deception: A new face of corporate fraud Security Malicious use of AI is reshaping the fraud landscape, creating… rooter April 10, 2025 1 min read 0
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor Security ESET researchers uncovered MirrorFace activity that expanded beyond its usual… rooter April 10, 2025 1 min read 0
Kids behaving badly online? Here’s what parents can do Security By taking time to understand and communicate the impact of… rooter April 10, 2025 1 min read 0
Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani Security Big shifts in the infostealer scene, novel attack vector against… rooter April 10, 2025 1 min read 0