First known AI-powered ransomware uncovered by ESET Research
ESET Research The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats 26...
Category Added in a WPeMatico Campaign
ESET Research The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats 26...
Kids Online Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the...
Kids Online Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the...
Kids Online Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the...
Business Security How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries...
Business Security How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries...
Business Security How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries...
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense...
This blogpost introduces an operation that we named RoundPress, targeting high-value webmail servers with XSS vulnerabilities, and that we assess...
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and...
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login...
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from...
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions...
In this blogpost, ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by...