Insights
What Verified Breach Data Changes About Exposure Monitoring
Exposure monitoring has become a core function for security and risk teams but many programs still struggle to deliver clear, actionable outcomes. Alerts pile up,...
How DataDome Stopped Millions of Ticket Scalping Bots Targeting a Global Sports Organization
Between January 8–13, 2026, a global sports organization was targeted by a scalping attack. Over six days, attackers launched more than 16 million malicious requests...
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More
Tenable Cloud Security continues to expand the technical depth of our Tenable One exposure management platform. Our latest enhancements include unified multi-cloud exploration, high-fidelity network...
AI Agent Orchestration: How It Works and Why It Matters
AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple specialized AI agents to complete...
Flaw in Broadcom Wi-Fi Chipsets Illuminates Importance of Wireless Dependability and Business Continuity
A wireless vulnerability affecting Broadcom Wi-Fi chipsets represents a timely warning for organizations that need always-on wireless access and a prime example of how easy it is for one bad actor...
OAuth User-Managed Access Protocol Overview
What exactly is UMA and why bother? Ever tried to share a private medical record with a specialist or give a budget app access to...
Trending News
This month in security with Tony Anscombe – January 2026 edition
The year got off to a busy start, with January offering an early snapshot of the challenges that (not just) cybersecurity teams are likely to...
DynoWiper update: Technical analysis and attribution
In this blog post, we provide more technical details related to our previous DynoWiper publication. Key points of the report: ESET researchers identified new data-wiping...
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
ESET researchers have uncovered an Android spyware campaign leveraging romance scam tactics to target individuals in Pakistan. The campaign uses a malicious app posing as...
Drowning in spam or scam emails? Here’s probably why
Digital Security Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem...
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
ESET Research The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper ESET Research 23 Jan 2026 • , 1 min....
Children and chatbots: What parents should know
Kids Online As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development Phil Muncaster 23...
