Insights

Are your secrets safe from cyber threats

How Do Non-Human Identities Reinforce Data Protection? How does one ensure that machine identities remain secure from cyber threats? This query emerges as organizations navigate...

What ensures NHI are protected in cloud platforms

What Makes Non-Human Identities Critical for Cloud Security? Have you considered how organizations can effectively secure their digital assets in cloud platforms? While we delve...

Security Researchers Breach Moltbook in Record Time

Security researchers from cloud cybersecurity firm Wiz disclosed a critical vulnerability in Moltbook, a newly launched social network designed for AI agents, that allowed them...

Adversarial Exposure Validation for Modern Environments

What is Adversarial  Exposure  Validation? Adversarial Exposure Validation is a structured approach that applies attacker-style actions to confirm how your environment behaves under real pressure....

Security Is Shifting From Prevention to Resilience

Dan Cole, senior vice president of product management at Sophos, unpacks how cybersecurity strategy is shifting from a prevention-first mindset toward resilience and response. Cole...

Using AI Agents to Separate Real Risk From Vulnerability Noise

Snir Ben Shimol, CEO and co-founder of Zest Security, talks about why vulnerability and exposure management has become one of the most stubborn problems in...

Trending News

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

Digital Security It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these...

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

Digital Security It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these...

This month in security with Tony Anscombe – January 2026 edition

The year got off to a busy start, with January offering an early snapshot of the challenges that (not just) cybersecurity teams are likely to...

DynoWiper update: Technical analysis and attribution

In this blog post, we provide more technical details related to our previous DynoWiper publication. Key points of the report: ESET researchers identified new data-wiping...

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

ESET researchers have uncovered an Android spyware campaign leveraging romance scam tactics to target individuals in Pakistan. The campaign uses a malicious app posing as...

Drowning in spam or scam emails? Here’s probably why

Digital Security Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem...