As we close out 2025, it's time for ESET Chief Security Evangelist Tony Anscombe to review some of the main cybersecurity stories from both the final month of the year and 2025 as a whole. Among the ...
The second half of the year underscored just how quickly attackers adapt and innovate, with rapid changes sweeping across the threat landscape. AI-powered malware moved from theory to reality in H2 ...
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
Cet article vous explique ce que sont ces outils, qu’on appelle aussi exécuteurs de scripts, triches ou hacks.
I recently had, what I thought, was a unique brainwave. (Spoiler alert: it wasn’t, but please read on!) As a marketing leader at ESET UK, part of my role is to communicate how our powerful and ...
Black Hat Europe 2025 opened with a presentation by Max Smeets of Virtual Rotes titled ‘Inside the Ransomware Machine’. The talk focused on the LockBit ransomware-as-a-service (RaaS) gang and Max’s ...
When a hedge fund manager opened up an innocuous Zoom meeting invite, he had little idea of the corporate carnage that was to follow. That invite was booby-trapped with malware, enabling threat actors ...
Skip to the next paragraph if your eyes glaze over at the long, long titles of industry reports: the AV-Comparatives Endpoint Prevention and Response Comparative Report 2025, MITRE ATT&CK Evaluations ...
Cada fin de año invita a reflexionar sobre lo que pasó, para analizarlo y tomar decisiones en el futuro cercano. La ciberseguridad no escapa a esta realidad. A continuación, realizaremos un repaso por ...
Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims Seeking symmetry during ATT&CK® season: How to harness today’s diverse ...