Insights
Can I feel confident in the security of machine identities
How Does Machine Identity Security Foster Confidence in Cybersecurity? Is your organization truly equipped to handle the complexities of machine identity security? While we...
What measures protect NHIs in high risk environments
Can Non-Human Identities Enhance Security in High-Risk Environments? One intriguing question is whether Non-Human Identities (NHIs) can effectively reinforce security measures in environments considered...
NDSS 2025 – The Road To Trust: Building Enclaves Within Confidential VMs
NDSS 2025 – The Road To Trust: Building Enclaves Within Confidential VMs Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Wenhao Wang...
2026 Kubernetes Playbook: AI at Scale, Self‑Healing Clusters, & Growth
In 2026, the question isn’t whether Kubernetes wins – it already has. And yet, many organizations are running mission-critical workloads on a platform they...
Best of 2025: Indirect prompt injection attacks target common LLM data sources
While the shortest distance between two points is a straight line, a straight-line attack on a large language model isn’t always the most efficient...
When One Vulnerability Breaks the Internet and Millions of Devices Join In
The final weeks of 2025 did not arrive quietly. A single software flaw rippled across the internet, healthcare providers disclosed deeply personal data exposures, and millions...
Trending News
This month in security with Tony Anscombe – December 2025 edition
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...
A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...
Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new...
ESET Threat Report H2 2025
ESET Research A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research...
Black Hat Europe 2025: Was that device designed to be on the internet at all?
Business Security Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found Tony Anscombe 12 Dec 2025 • ...
