Gamaredon’s operations under the microscope – Week in security with Tony Anscombe
ESET research examines the group’s malicious wares as used to spy on targets in Ukraine in the past two years...
Read more →ESET research examines the group’s malicious wares as used to spy on targets in Ukraine in the past two years...
Read more →Mar 25, 2025Ravie LakshmananMobile Security / Data Theft Cybersecurity researchers are calling attention to an Android malware campaign that leverages...
Read more →Table of Contents I have been thinking a lot about the competition between OpenAI, Anthropic, Meta, and Google for who...
Read more →Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices 01 Oct 2024...
Read more →Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644...
Read more →On the 8th of October in 2027, an alien craft was seen entering the atmosphere over the Atlantic around 600...
Read more →Building efficient recovery options will drive ecosystem resilience 01 Oct 2024 • , 4 min. read Last week, a US...
Read more →A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside...
Read more →The government has fallen short in its response to recommendations made to speed up financial redress for subpostmasters affected by...
Read more →U.S. CISA adds Google Chromium Mojo flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini March 27, 2025 U.S. Cybersecurity...
Read more →Table of Contents A new way to explain LLM-based AI Thanks to Eliezer Yudkowsky, I just found my new favorite...
Read more →Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this...
Read more →