Insights

Session-Based Authentication vs Token-Based Authentication: Key Differences Explained

Why microservices needs a different identity approach Ever tried to untangle a giant ball of yarn that’s been soaked in glue? That is basically...

RBAC vs ReBAC: Comparing Role-Based & Relationship-Based Access Control

The Authz Dilemma: Why Roles Aren't Always Enough Ever felt like your auth logic is just one giant "if" statement that’s about to explode?...

Apple’s new ‘Creator Studio’ just became a flagship service

Final Cut Pro, Logic Pro, and Pixelmator Pro on Macs and iPads. Motion, Compressor, and MainStage on the Mac. Intelligent features and premium content for...

When the Marketing Graph Becomes the Target Map

Ad tech platforms likely know more about your executives than your security team does… and that information is available to anyone willing to pay...

Can You Afford the Total Cost of Free Java?

Summary If you’re considering running Java on a free JVM distribution without commercial, support, you have to assess the cost of free Java. Part of that...

BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow

Key Takeaways AI agents significantly amplify the impact of traditional security flaws. A Virtual Agent integration flaw (CVE-2025-12420) allowed unauthenticated attackers to impersonate any...

Trending News

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new...

ESET Threat Report H2 2025

ESET Research A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research...