Insights

After AI review: Google stops dangerous health advice

The Guardian has published a number of articles highlighting the risks of asking health-related questions to chatbots or other AI tools. For example, Google’s AI...

India may require smartphone manufacturers to disclose source code

According to information provided to Reuters, India is considering a new security requirement that could require smartphone manufacturers to share their source code with the...

Randall Munroe’s XKCD ‘Jumping Frog Radius’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from...

Account Takeover (ATO) Attacks Explained: Detection, Prevention & Mitigation

Understanding the anatomy of an account takeover Ever wonder how someone just "poof" disappears from their own bank account while the balance hits zero?...

The Benefits and Risks of Transitioning to Passwordless Solutions

The headache of moving millions of users Ever tried moving five million users between identity providers on a Friday night? It's basically like trying...

NDSS 2025 – Mens Sana In Corpore Sano: Sound Firmware Corpora For Vulnerability Research

Session 8C: Hard & Firmware Security Authors, Creators & Presenters: René Helmke (Fraunhofer FKIE), Elmar Padilla (Fraunhofer FKIE, Germany), Nils Aschenbruck (University of Osnabrück)...

Trending News

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new...

ESET Threat Report H2 2025

ESET Research A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research...