Mobile applications have become central to daily operations, from banking transactions to enterprise communications. However, this reliance...
cybersecurity
Internal and external penetration testing (pentesting) are critical components for evaluating an organization’s security posture. These simulated...
In an era of evolving cyber threats, organizations are adopting realistic methods to test their defenses. Red...
Industrial Control Systems (ICS) and SCADA networks form the backbone of modern critical infrastructure, from power plants...
Cybercriminals are exploiting macOS’s push notification system to distribute fake alerts mimicking legitimate system warnings. These malicious...
Artificial Intelligence is transforming PowerShell scripting by introducing GitHub Copilot, a powerful tool powered by OpenAI’s GPT-4....
When integrating applications with Microsoft Azure, administrators may encounter the error “AADSTS700054: response_type ‘id_token’ is not enabled...
Multi-factor authentication (MFA) is a foundational security control, but attackers are increasingly bypassing it using MFA Push...
Large Language Models (LLMs) are increasingly integrated into enterprise workflows, but a new attack vector—ASCII smuggling—exploits Unicode’s...
Check Point Research has uncovered a sophisticated phishing campaign leveraging Google Firebase to host fraudulent pages mimicking...
ESET researchers have uncovered a sophisticated adware campaign called HotPage, which abuses a vulnerable Microsoft-signed driver to...
ESET Research has uncovered a series of cyberespionage campaigns conducted by the advanced persistent threat (APT) group...
ESET researchers have uncovered a significant evolution in the operations of the Telekopye cybercriminal network, which has...
ESET’s latest APT Activity Report for Q2-Q3 2024 reveals significant developments in state-aligned cyber threats, with China,...
Following an international law enforcement takedown of the RedLine Stealer malware-as-a-service (MaaS) operation in October 2024, ESET...
Summary for Security Leadership The Russia-aligned RomCom APT group (also tracked as Storm-0978 or UNC2596) has been...
The second half of 2024 has seen significant shifts in the cyberthreat landscape, according to ESET’s latest...
As organizations prepare for seasonal breaks, cybercriminals are actively planning attacks. The holiday period often sees a...
Summary for CISOs: A critical vulnerability (CVE-2024-7344) in UEFI Secure Boot allows attackers to bypass security checks...
A critical vulnerability (CVE-2025-2687) has been discovered in PHPGurukul eLearning System 1.0, affecting its Image Handler component....