Strong cybersecurity creates value that may not be immediately obvious or measurable. Here's where to look forit.
A mesure que les menaces cyber s’intensifient, dopées à l’IA, les défis liés aux métiers de la cybersécurité se complexifient également, entre déficit de talent et épuisement professionnel. Pourtant, ...
We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses ...
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?
Une fois encore, les chiffres mettent en lumière une réalité peu rassurante : le réflexe de choisir des mots de passe ...
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools ...
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks. Let’s take a closer look.
Pour les entreprises, il n’est plus questions de savoir si une attaque va survenir, mais plutôt quand. Alors comment se ...
To misquote Benjamin Franklin, nothing is certain in this world except for death, taxes and scammers. Unfortunately, with tax filing season now in full swing, the fraudsters are also out in force, ...
In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new malware on the same system, none of ...
Black Hat Europe 2025 opened with a presentation by Max Smeets of Virtual Rotes titled ‘Inside the Ransomware Machine’. The talk focused on the LockBit ransomware-as-a-service (RaaS) gang and Max’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results