ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
A cyber attack hit the Australian software provider Energy One Security The Australian software provider Energy One announced it was hit… rooter August 22, 2023 2 min read 0
The Ultimate Patch Management Checklist to Evaluate the Success of Your Patching Program! Security Vulnerabilities are growing exponentially, and it strains IT security admins… rooter February 20, 2023 1 min read 0
Member of Lapsus$ gang sentenced to an indefinite hospital order Security A member of the Lapsus$ cyber extortion group, Arion Kurtaj,… rooter December 22, 2023 3 min read 0
Microsoft Signing Key Stolen by Chinese Security A bunch of networks, including US Government networks, have been… rooter August 7, 2023 2 min read 0