ESET researchers offer a deep dive analysis of the CVE 2025 50165 vulnerability and provide their method to reproduce the crash using a simple 12-bit or 16-bit JPG image, and an examination of the ...
The China-linked LongNosedGoblin APT has been using Group Policy for malware deployment and lateral movement within governmental networks.
ESET Research's latest Threat Report detailed PromptLock, the first known AI-driven ransomware, “capable of generating malicious scripts on the fly”, using an OpenAI model, via the Ollama API, to ...
China-linked Evasive Panda used DNS poisoning to deliver the MgBot backdoor in targeted espionage attacks from 2022 to 2024.
Cyber extortion is accelerating, powered by phishing gangs and crime-as-a-service. Explore 2025 trends and why attacks are ...
A threat actor known as Zestix has been offering to corporate data stolen from dozens of companies likely after breaching ...
The second half of the year underscored just how quickly attackers adapt and innovate, with rapid changes sweeping across the threat landscape. AI-powered malware moved from theory to reality in H2 ...
Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready ...
The number represents a more precise, and potentially much larger, figure than earlier estimates. The department is seeking ...
ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
Weekly roundup exploring how cyber threats, AI misuse, and digital deception are reshaping global security trends.
The Justice Department needs 400 lawyers from four different department offices to help with the process through late January ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results