ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
Threat actors claim the hack of Sony, and the company investigates Security Sony launched an investigation into an alleged data breach after… rooter September 26, 2023 3 min read 0
Understanding Managed Detection and Response – and what to look for in an MDR solution Security Why your organization should consider an MDR solution and five… rooter March 24, 2023 1 min read 0
Threat actors exploited Palo Alto Pan-OS issue to deploy a Python Backdoor Security Threat actors have been exploiting the recently disclosed zero-day in… rooter April 15, 2024 4 min read 0
Avoid juice jacking and recharge your batteries safely this summer Security Cybercriminals can use USB charging stations in airports, hotels, malls… rooter June 29, 2023 1 min read 0