Insights

Palo Alto Networks Defines SHIELD Framework to Secure Vibecoding

Palo Alto Networks has developed a framework, dubbed SHIELD, that defines a set of best practices for securing applications developed using vibecoding techniques enabled...

Turkish Security Researcher Gets Nod From NASA Over Vulnerability Discoveries 

Cyberdefenders are drawing accolades these days. First, the UK lead at the National Crime Agency (NCA), who coordinated Operation Cronos to take down LockBit,...

Operation Cronos Leader Gets Nod From King Charles 

A British law enforcement officer just got the royal treatment from Buckingham Palace for his role in the takedown of LockBit ransomware in 2024....

How protected are your secrets in hybrid environments?

Are Your Machine Identities Secure in Hybrid Environments? Managing Non-Human Identities (NHIs) is becoming a crucial aspect of cybersecurity strategies, particularly in hybrid environments....

What innovative approaches exist for Agentic AI security?

How Can We Securely Manage Non-Human Identities (NHIs) in the Age of Agentic AI? Have you ever pondered how machine identities are secured? The...

Massive Instagram Data Scare Ties 17.5M Accounts to Leak, But Meta Denies Breach

A major cybersecurity scare has put Instagram, one of the world’s largest social networks, under intense scrutiny after millions of users globally reported unexpected...

Trending News

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new...

ESET Threat Report H2 2025

ESET Research A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research...