The who, where, and how of APT attacks in Q4 2024–Q1 2025
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
The official site for RVTools has been hacked to serve a compromised installer for the popular VMware environment reporting utility.…
Several ransomware actors are using a malware called Skitnet as part of their post-exploitation efforts to steal sensitive data and…
If the Common Vulnerabilities and Exposures system continues to face uncertainty, the repercussions will build slowly, and eventually the cracks…
Following the disclosure of CVE-2025-31324, an unauthenticated file upload vulnerability in SAP NetWeaver enabling RCE, two more security flaws have…
In response to a FOIA request, the NSA released “Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, with…
Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs.…
Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited…
Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running, and maintaining their organization’s reputation. This week’s…
In an era of digital banking, cloud migration, and a growing cyber threat landscape, traditional perimeter-based security models are no…