For many IT and security practitioners, this plays out daily as they scramble to manage what IBM once called a "Frankencloud, ...
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations have ...
When an online account is compromised, the first few minutes may determine how bad the incident ultimately gets.
Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when many people don’t think twice about ...
Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to ...
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers.
The average internet user has an estimated 168 passwords for their personal accounts, according to a study from 2024. That’s a massive 68% increase on the tally four years previously. Given the ...
Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves ESET’s Jake Moore used smart glasses, deepfakes and face ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions ...
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026 Start using a new app and you’ll often be asked to ...
ESET researchers have documented and analyzed TA410 activity going back to 2019. TA410 is a cyberespionage umbrella group loosely linked to APT10, known mostly for targeting US-based organizations in ...
In this blogpost, ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by the China-aligned threat actor that we have named ...