Insights
The 8 Most Dangerous File Types for Malware Infections
October 14, 2025 Every file your organization touches is a potential threat in disguise. Behind the spreadsheets, contracts, and reports that keep business running, cybercriminals...
Risk-Based Vulnerability Management: Prioritize What Actually Matters
Oct 14, 2025 Risk-Based Vulnerability Management (RBVM): Prioritize What Actually Matters Threat Detection and Response in cybersecurity is a two-part process designed to protect an...
The LLM Dependency Trap
Large language models are reshaping how we write software. With a few prompts, developers can generate boilerplate, integrate dependencies, write tests, and scaffold entire systems...
OpenAI: Latest news and insights
OpenAI fears irreparable harm from Musk, files countersuit April 10, 2025: OpenAI has filed a countersuit against Elon Musk, accusing the billionaire of a sustained...
Beyond Alerts: Building Smarter, Context-Aware Threat Detection
Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI is transforming the way enterprises...
Preparing for the Next Wave of AI-Driven Threats
Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, discusses how artificial intelligence and evolving threat dynamics are reshaping cybersecurity. Rodriguez brings a unique perspective—equal...
Trending News
Gamaredon X Turla collab
In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025,...
Small businesses, big targets: Protecting your business against ransomware
Business Security Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises Phil...
HybridPetya: The Petya/NotPetya copycat comes with a twist
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new...
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising...
Are cybercriminals hacking your systems – or just logging in?
Business Security As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked...
Preventing business disruption and building cyber-resilience with MDR
Business Security Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy...