Insights

What roles do Agentic AI play in innovation?

How Secure Are Your Non-Human Identities in Cloud Environments? Are your organization’s digital assets as secure as they could be? Ensuring the security of...

How do NHIs empower secure cloud environments?

How Can Non-Human Identities Transform Secure Cloud Environments? What underpins a robust cloud security strategy when it comes to machine identities? Managing Non-Human Identities...

Beyond “Is Your SOC AI Ready?” Plan the Journey!

You read the “AI-ready SOC pillars” blog, but you still see a lot of this: Bungled AI SOC transition How do we do better? Let’s go...

Randall Munroe’s XKCD ‘Apples’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from...

Radware Discloses ZombieAgent Technique to Compromise AI Agents

Radware this week announced it has discovered a zero-click indirect prompt injection (IPI) vulnerability targeting the Deep Research agent developed by OpenAI.Dubbed ZombieAgent, Radware...

Use of XMRig Cryptominer by Threat Actors Expanding: Expel

XMRig is a legitimate open-source cryptocurrency mining tool available on GitHub that hackers for years have been deploying in campaigns aiming to steal crypto...

Trending News

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new...

ESET Threat Report H2 2025

ESET Research A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research...