Insights
AO-labs
LEADING SAAS and AI SECURITY RESEARCH An elite team of security researchers dedicated to uncovering and neutralizing SaaS and AI vulnerabilities and unknown threats...
The Team PCP Snowball Effect: A Quantitative Analysis
The PCP Team's supply chain attacks compromised two critical components of the development ecosystem: AquaSecurity's trivy-action and the Python litellm package. These incidents affected...
Criminals are renting virtual phones to bypass bank security
Researchers at Group-IB warn about criminals using virtual Android devices to bypass modern security solutions. Cloud phones are virtual Android devices that can fully...
Bogus Avast website fakes virus scan, installs Venom Stealer instead
A fake website impersonating Avast antivirus is tricking people into infecting their own computers. The site looks legitimate, runs what appears to be a...
Digital Marketing for SaaS Companies: Solving the Biggest Growth and Customer Acquisition Challenges
SaaS companies face unique marketing challenges that traditional businesses rarely encounter. Instead of selling one-time products, SaaS businesses depend on recurring revenue, continuous product...
Anthropic wins reprieve against US DoD ban, buying time for contractors to assess AI supply chains
She added, “At oral argument, government counsel suggested that Anthropic showed its subversive tendencies by ‘questioning’ the use of its technology, ‘raising concerns’ about it,...
Trending News
Virtual machines, virtually everywhere – and with real security gaps
Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...
Cloud workload security: Mind the gaps
Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026 • ...
Move fast and save things: A quick guide to recovering a hacked account
Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....
EDR killers explained: Beyond the drivers
In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...
Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...
Cyber fallout from the Iran war: What to have on your radar
The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...
