ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
How to track and stop CVE-2024-3400: Palo Alto Devices API Exploit Causing Critical Infrastructure and Enterprise Epidemics Security A severe command injection vulnerability in the GlobalProtect Gateway feature… rooter April 13, 2024 4 min read 0
8 Tips to protect your devices from malware attacks Security Unfortunately, when your devices are infected with a virus, it’s… rooter October 4, 2024 4 min read 0
New Agent Raccoon malware targets the Middle East, Africa and the US Security Threat actors are using the Agent Raccoon malware in attacks… rooter December 3, 2023 2 min read 0
Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case Security US DoJ sentenced a Moldovan national (31) to 42 months… rooter March 15, 2024 2 min read 0