From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company.
This issue of the ESET APT Activity Report reviews notable activities of APT groups that were documented by ESET researchers ...
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT ...
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and ...
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data.
Once threat actors get inside your network, the clock is ticking. Whether they are after sensitive data to steal and ransom, ...
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you and ...
We have discovered a previously unreported version of Android spyware used by APT-C-23, a threat group also known as Two-tailed Scorpion and mainly targeting the Middle East. ESET products detect the ...
In the remote and hybrid work era, employee use of unsanctioned hardware and software (known as shadow IT) has become an acute problem that results in security gaps along with potential data loss and ...
According to Verizon's 2025 Data Breach Investigations Report (DBIR), no less than 44 percent of breaches last year involved ransomware, highlighting the enduring threat that this form of ...
Infostealers remain one of the most persistent threats on today’s threat landscape. They’re built to quietly siphon off valuable information, typically login credentials and financial and ...
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise ...