ESET Research Podcast: Sextortion, digital usury and SQL brute-force Posted on September 13, 2023 Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
FBI investigating apparent ISIS attacks on Western websites Security A number of seemingly unconnected Western websites were hacked over… rooter April 9, 2025 1 min read 0
Friday Squid Blogging: We’re Almost at Flying Squid Drones Security Researchers are prototyping multi-segment shapeshifter drones, which are “the precursors… rooter March 3, 2023 1 min read 0
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks Security Nation-state actor UAT4356 has been exploiting two zero-days in ASA… rooter April 24, 2024 3 min read 0
Is Your Money Safe? Discover the Hidden Dangers of Tap and Pay Technology Security Tap and pay technology has completely changed the way we… rooter July 30, 2024 1 min read 0