Insights

How smart are the latest NHIs in threat detection?

What Makes Smart NHIs the Key to Advanced Threat Detection? How can organizations ensure their systems are shielded from invisible threats? One crucial element...

Can Agentic AI meet future cybersecurity demands?

How Can Organizations Build Cybersecurity Confidence with Agentic AI? What if there was a way to seamlessly integrate cybersecurity protocols into the very fabric...

After AI review: Google stops dangerous health advice

The Guardian has published a number of articles highlighting the risks of asking health-related questions to chatbots or other AI tools. For example, Google’s AI...

India may require smartphone manufacturers to disclose source code

According to information provided to Reuters, India is considering a new security requirement that could require smartphone manufacturers to share their source code with the...

Randall Munroe’s XKCD ‘Jumping Frog Radius’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from...

Account Takeover (ATO) Attacks Explained: Detection, Prevention & Mitigation

Understanding the anatomy of an account takeover Ever wonder how someone just "poof" disappears from their own bank account while the balance hits zero?...

Trending News

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new...

ESET Threat Report H2 2025

ESET Research A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research...