Insights
What roles do Agentic AI play in innovation?
How Secure Are Your Non-Human Identities in Cloud Environments? Are your organization’s digital assets as secure as they could be? Ensuring the security of...
How do NHIs empower secure cloud environments?
How Can Non-Human Identities Transform Secure Cloud Environments? What underpins a robust cloud security strategy when it comes to machine identities? Managing Non-Human Identities...
Beyond “Is Your SOC AI Ready?” Plan the Journey!
You read the “AI-ready SOC pillars” blog, but you still see a lot of this: Bungled AI SOC transition How do we do better? Let’s go...
Randall Munroe’s XKCD ‘Apples’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from...
Radware Discloses ZombieAgent Technique to Compromise AI Agents
Radware this week announced it has discovered a zero-click indirect prompt injection (IPI) vulnerability targeting the Deep Research agent developed by OpenAI.Dubbed ZombieAgent, Radware...
Use of XMRig Cryptominer by Threat Actors Expanding: Expel
XMRig is a legitimate open-source cryptocurrency mining tool available on GitHub that hackers for years have been deploying in campaigns aiming to steal crypto...
Trending News
Credential stuffing: What it is and how to protect yourself
Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...
This month in security with Tony Anscombe – December 2025 edition
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...
A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...
Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new...
ESET Threat Report H2 2025
ESET Research A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research...
