ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
Idaho National Laboratory data breach impacted 45,047 individuals Security The Idaho National Laboratory (INL) announced that it has suffered… rooter December 15, 2023 3 min read 0
Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities Security Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT… rooter April 22, 2024 4 min read 0
Evaluating the Effectiveness of Reward Modeling of Generative AI Systems Security New research evaluating the effectiveness of reward modeling during Reinforcement… rooter September 11, 2024 2 min read 0
Abusing the Ubuntu ‘command-not-found’ utility to install malicious packages Security Researchers reported that attackers can exploit the ‘command-not-found’ utility to… rooter February 14, 2024 3 min read 0