Crypto is soaring, but so are threats: Here’s how to keep your wallet safe
As detections of cryptostealers surge across Windows, Android and macOS, it’s time for a refresher on how to keep your…
As detections of cryptostealers surge across Windows, Android and macOS, it’s time for a refresher on how to keep your…
Some of the state’s new child safety law can be easily circumvented. Should it have gone further?
In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation…
The story of a signed UEFI application allowing a UEFI Secure Boot bypass
ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group…
ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems
Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational…
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance…
ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure…
Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly…