From the end of Windows 10 support to scams on TikTok and state-backed hackers wielding AI, October's headlines offer a ...
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of ...
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms.
Les coffres virtuels et autres récompenses aléatoires intégrées aux jeux vidéo peuvent exposer les enfants à des risques ...
ESET researchers have uncovered two Android spyware campaigns targeting individuals interested in secure communication apps, namely Signal and ToTok. These campaigns distribute malware through ...
As announced by the US Department of Justice – the FBI and US DoD’s Defense Criminal Investigative Service (DCIS) have managed to disrupt the infrastructure of the notorious infostealer, Danabot. ESET ...
On 2021-03-02, Microsoft released out-of-band patches for Microsoft Exchange Server 2013, 2016 and 2019. These security updates fixed a pre-authentication remote code execution (RCE) vulnerability ...
Here’s what to know about the malware that tops infostealer charts in 2025 and has an insatiable appetite for valuable data.
ESET researchers reveal their findings about POLONIUM, an advanced persistent threat (APT) group about which little information is publicly available and its initial compromise vector is unknown.
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures ...
AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of forks and variants. While its capabilities are not that ...
The latest Petya-like outbreak has gathered a lot of attention from the media. However, it should be noted that this was not an isolated incident: this is the latest in a series of similar attacks in ...