Insights

GlassWorm attack installs fake browser extension for surveillance

GlassWorm hides inside developer tools. Once it’s in, it steals data, installs remote access malware, and even a fake browser extension to monitor activity....

How Modern Classroom Management Tools Help Teachers Reclaim Instructional Time

Technology has transformed modern classrooms, opening the door to more interactive and collaborative learning experiences. However, it has also introduced new challenges for teachers....

As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters

In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and...

What IT leaders need to know about AI-fueled death fraud

There’s a better way, Kiser noted: “OAuth Token Exchange exists as a technical solution that enables proper delegated authority proves Bob is authorized to act...

Enhancing User Experience with Passwordless Authentication: A Design-First Approach

Passwords were meant to protect users. Instead, they’ve become one of the biggest sources of friction in digital products. As explained by the FIDO...

Entropy-Rich Synthetic Data Generation for PQC Key Material

Understanding the core of the sso server Ever wonder why you don't gotta type your password fifty times a day just to check email...

Trending News

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...

Cloud workload security: Mind the gaps

Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026  • ...

Move fast and save things: A quick guide to recovering a hacked account

Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....

EDR killers explained: Beyond the drivers

In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...

Face value: What it takes to fool facial recognition

ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...

Cyber fallout from the Iran war: What to have on your radar

The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...