Insights
What Are the Most Popular Single Sign-On Options?
Understanding Pay-Per-Call Marketing Okay, so you're wondering what pay-per-call marketing is, right? Honestly, I think it's one of those things that's been around for...
Google Uses Courts, Congress to Counter Massive Smishing Campaign
Google is taking a multi-pronged approach to stopping a widespread global smishing operation that targeted more than a million victims through text messages warning...
NDSS 2025 – Magmaw: Modality-Agnostic Adversarial Attacks
SESSIONSession 3B: Wireless, Cellular & Satellite Security Authors, Creators & Presenters: Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San...
Can You Future-Proof Your Life in the Age of AI? (Book Review)
Lohrmann on Cybersecurity In his book Comfort Override: Future-Proof Your Life as AI Flips Your World, Ranan Lachman explores how we can prepare and...
MY TAKE: AI’s fortune-teller effect — why it’s all too easy to mistake pattern mastery for wisdom
By Byron V. Acohido I hadn’t expected the machine’s answer to be that good. Related: The AI bubble is inflating It was a simple...
What impact does Agentic AI have on cloud-native security
How Can Organizations Safeguard Non-Human Identities in the Age of Agentic AI? How can robust management of Non-Human Identities (NHIs) and Secrets Security Management...
Trending News
How password managers can be hacked – and how to stay safe
Digital Security Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe Phil Muncaster...
Why shadow AI could be your biggest security blind spot
Business Security From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Phil Muncaster 11 Nov...
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025 • ...
The who, where, and how of APT attacks in Q2 2025–Q3 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report 07 Nov 2025...
ESET APT Activity Report Q2 2025–Q3 2025
ESET ResearchThreat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 Jean-Ian...
Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data Christian Ali Bravo 05 Nov 2025 • ,...
