Insights
Adversarial Exposure Validation for Modern Environments
What is Adversarial Exposure Validation? Adversarial Exposure Validation is a structured approach that applies attacker-style actions to confirm how your environment behaves under real pressure....
Security Is Shifting From Prevention to Resilience
Dan Cole, senior vice president of product management at Sophos, unpacks how cybersecurity strategy is shifting from a prevention-first mindset toward resilience and response. Cole...
Using AI Agents to Separate Real Risk From Vulnerability Noise
Snir Ben Shimol, CEO and co-founder of Zest Security, talks about why vulnerability and exposure management has become one of the most stubborn problems in...
HP CEO Enrique Lores leaves to lead PayPal
American dream Enrique Lores is one of those paradigmatic cases of the long-awaited ‘American dream’ that argues that anyone can achieve success through hard work....
Enabling and Securing Basic Authentication: A Comprehensive Guide
The Reality of Basic Authentication in Enterprise Ever wonder why we're still talking about basic auth in 2024 when we have fancy things like passkeys...
Managing a Security Token Service
What is a security token service anyway? Ever tried explaining to your parents why they can't just use one password for the entire internet? It’s...
Trending News
A slippery slope: Beware of Winter Olympics scams and other cyberthreats
Digital Security It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these...
A slippery slope: Beware of Winter Olympics scams and other cyberthreats
Digital Security It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these...
This month in security with Tony Anscombe – January 2026 edition
The year got off to a busy start, with January offering an early snapshot of the challenges that (not just) cybersecurity teams are likely to...
DynoWiper update: Technical analysis and attribution
In this blog post, we provide more technical details related to our previous DynoWiper publication. Key points of the report: ESET researchers identified new data-wiping...
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
ESET researchers have uncovered an Android spyware campaign leveraging romance scam tactics to target individuals in Pakistan. The campaign uses a malicious app posing as...
Drowning in spam or scam emails? Here’s probably why
Digital Security Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem...
