As a marketing leader at ESET UK, part of my role is to communicate how our powerful and comprehensive solutions can be ...
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found.
Black Hat Europe 2025 opened with a presentation by Max Smeets of Virtual Rotes titled ‘Inside the Ransomware Machine’. The talk focused on the LockBit ransomware-as-a-service (RaaS) gang and Max’s ...
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook.
“Continue with Google” – such a seamless way to sign up for and log into a website or app, especially since you likely are already logged into your Google account. All you need to do is tap or click ...
Phishing, smishing and vishing remain a popular way to harvest credentials, especially in more targeted attacks. Often, ...
The average internet user has an estimated 168 passwords for their personal accounts, according to a study from 2024. That’s a massive 68% increase on the tally four years previously. Given the ...
Put simply, a whaling cyberattack is one targeted at a high-profile, senior member of the corporate leadership team. It could come in the form of a phishing/smishing/vishing effort, or a business ...
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results