Insights

AO-labs

LEADING SAAS and AI SECURITY RESEARCH An elite team of security researchers dedicated to uncovering and neutralizing SaaS and AI vulnerabilities and unknown threats...

The Team PCP Snowball Effect: A Quantitative Analysis

The PCP Team's supply chain attacks compromised two critical components of the development ecosystem: AquaSecurity's trivy-action and the Python litellm package. These incidents affected...

Criminals are renting virtual phones to bypass bank security

Researchers at Group-IB warn about criminals using virtual Android devices to bypass modern security solutions. Cloud phones are virtual Android devices that can fully...

Bogus Avast website fakes virus scan, installs Venom Stealer instead

A fake website impersonating Avast antivirus is tricking people into infecting their own computers. The site looks legitimate, runs what appears to be a...

Digital Marketing for SaaS Companies: Solving the Biggest Growth and Customer Acquisition Challenges

SaaS companies face unique marketing challenges that traditional businesses rarely encounter. Instead of selling one-time products, SaaS businesses depend on recurring revenue, continuous product...

Anthropic wins reprieve against US DoD ban, buying time for contractors to assess AI supply chains

She added, “At oral argument, government counsel suggested that Anthropic showed its subversive tendencies by ‘questioning’ the use of its technology, ‘raising concerns’ about it,...

Trending News

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...

Cloud workload security: Mind the gaps

Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026  • ...

Move fast and save things: A quick guide to recovering a hacked account

Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....

EDR killers explained: Beyond the drivers

In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...

Face value: What it takes to fool facial recognition

ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...

Cyber fallout from the Iran war: What to have on your radar

The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...