Insights

The 8 Most Dangerous File Types for Malware Infections

October 14, 2025 Every file your organization touches is a potential threat in disguise. Behind the spreadsheets, contracts, and reports that keep business running, cybercriminals...

Risk-Based Vulnerability Management: Prioritize What Actually Matters

Oct 14, 2025 Risk-Based Vulnerability Management (RBVM): Prioritize What Actually Matters Threat Detection and Response in cybersecurity is a two-part process designed to protect an...

The LLM Dependency Trap

Large language models are reshaping how we write software. With a few prompts, developers can generate boilerplate, integrate dependencies, write tests, and scaffold entire systems...

OpenAI: Latest news and insights

OpenAI fears irreparable harm from Musk, files countersuit April 10, 2025: OpenAI has filed a countersuit against Elon Musk, accusing the billionaire of a sustained...

Beyond Alerts: Building Smarter, Context-Aware Threat Detection

Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI is transforming the way enterprises...

Preparing for the Next Wave of AI-Driven Threats

Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, discusses how artificial intelligence and evolving threat dynamics are reshaping cybersecurity. Rodriguez brings a unique perspective—equal...

Trending News

Gamaredon X Turla collab

In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025,...

Small businesses, big targets: Protecting your business against ransomware

Business Security Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises Phil...

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new...

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising...

Are cybercriminals hacking your systems – or just logging in?

Business Security As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked...

Preventing business disruption and building cyber-resilience with MDR

Business Security Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy...