Friday Squid Blogging: The Giant Squid Nebula
Beautiful photo. Difficult to capture, this mysterious, squid-shaped interstellar cloud spans nearly three full moons in planet Earthâs sky. Discovered in 2011 by French astro-imag...
New Mobile Phone Forensics Tool
The Chinese have a new tool called Massistant. Massistant is the presumed successor to Chinese forensics tool, âMFSocketâ, reported in 2019 and attributed to publicly traded cyber...
8 trends transforming the MDR market today
Skills gaps, increased regulatory pressures, and digital transformation are just a few of the factors pushing the growth of burgeoning managed detection and response (MDR) market.
Security Vulnerabilities in ICEBlock
The ICEBlock tool has vulnerabilities: The developer of ICEBlock, an iOS app for anonymously reporting sightings of US Immigration and Customs Enforcement (ICE) officials, promises...
How AI is changing the GRC strategy
CISOs find themselves at a pinch-point needing to manage AI risks while supporting organizational innovation. The way forward is adapting GRC frameworks.
Hacking Trains
Seems like an old system system that predates any care about security: The flaw has to do with the protocol used in a train system known as the End-of-Train and Head-of-Train. A Fl...
So endet die Dienstreise nicht in Gewahrsam
Dienst- und GeschĂ€ftsreisen bergen in Zeiten geopolitischer Konflikte und autoritĂ€rer Tendenzen neue Risiken fĂŒr Organisationen jeder GröĂe. Darauf sollten (Sicherheits-)Entscheide...
DOGE Denizen Marko Elez Leaked API Key for xAI
Marko Elez, a 25-year-old employee at Elon Musk's Department of Government Efficiency (DOGE), has been granted access to sensitive databases at the U.S. Social Security Administrat...
Yet Another Strava Privacy Leak
This time itâs the Swedish prime ministerâs bodyguards. (Last year, it was the US Secret Service and Emmanuel Macronâs bodyguards. in 2018, it was secret US military bases.) This i...
Microsoft Patch Tuesday, July 2025 Edition
Microsoft today released updates to fix at least 137 security vulnerabilities in its Windows operating systems and supported software. None of the weaknesses addressed this month a...
Hiding Prompt Injections in Academic Papers
Academic papers were found to contain hidden instructions to LLMs: It discovered such prompts in 17 articles, whose lead authors are affiliated with 14 institutions including Japan...
US Supreme Court Upholds Texas Porn ID Law
In a 6-3 decision, the Supreme Court held that age verification for explicit sites is constitutional. In a dissent, Justice Elena Kagan warned it burdens adults and ignores First A...
ESET Threat Report H1 2025
The H1 2025 issue of the ESET Threat Report reviews the key trends and developments that shaped the threat landscape from November 2024 to May 2025
ESET Threat Report H1 2025
The H1 2025 issue of the ESET Threat Report reviews the key trends and developments that shaped the threat landscape from November 2024 to May 2025
The Retaliation Window
Dive into the concept of the "retaliation window"âhow timing influences threat intelligence, risk management, and strategic decision-making in today's cyber and business landscape.
Threats to the 2025 NATO Summit
Explore how state-sponsored actors, cybercriminals, and hacktivists are targeting the 2025 NATO Summit. Insight from Recorded Futureâs Insikt Group reveals escalating cyber, AI, an...
IPv6 Drip Drowns Spray-and-Pray
Explore how IPv6-first networks disrupt mass scanning tactics and enable stronger, AI-driven security through deceptive address space and Zero Trust principles.
Patch Tuesday, June 2025 Edition
Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws is already under act...
The Evolving Role of the Modern CISO
In this episode, we explore the evolving role of the Chief Information Security Officer (CISO) and how itâs shifting from a purely technical position to a core part of business str...
Danabot under the microscope
ESET Research has been tracking Danabotâs activity since 2018 as part of a global effort that resulted in a major disruption of the malwareâs infrastructure.
Danabot under the microscope
ESET Research has been tracking Danabotâs activity since 2018 as part of a global effort that resulted in a major disruption of the malwareâs infrastructure.
Danabot: Analyzing a fallen empire
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation.
Danabot: Analyzing a fallen empire
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation.
Lumma Stealer: Down for the count
The bustling enterprise, recently disrupted by a global effort including ESET, is notorious for going after all manner of sensitive data, including passwords, credit card numbers, ...
Lumma Stealer: Down for the count
The bustling enterprise, recently disrupted by a global effort including ESET, is notorious for going after all manner of sensitive data, including passwords, credit card numbers, ...
Rate My Rizz
Explore how CISOs can transition from audit checkmarks to genuine cyber resilience through continuous control validation. Insights from RSA 2025 on redefining cybersecurity strateg...
Measuring the US-China AI Gap
Explore Insikt Group's in-depth 2025 report on the US-China AI raceâcomparing funding, talent, regulation, compute capacity, and model benchmarks. Discover why China trails the US ...
What is a Fraud Scheme?
The fraud auditing industry uses so many terms interchangeably that it creates confusion. Let's cut the confusion and implement better fraud definitions.
Cyber Resilience is More Than a Buzzword
For business leaders, cyber resilience ensures continuity in the face of disruption. For practitioners, itâs about having the right tools, processes, and mindset to combat evolving...
Fast Flux: A National Security Threat
This advisory encourages service providers to help mitigate the fast flux threat by developing accurate, reliable, and timely detection analytics and blocking
#StopRansomware: Medusa Ransomware
Medusa is a ransomware-as-a-service (RaaS) variant first identified in June 2021. As of February 2025, Medusa developers and affiliates have impacted over 300
Beware: Tax Season is Scam Season
Tax season is also prime time for tax scams. To safeguard your personal information, consider these key points: Communication methods The IRS initiates contact primarily through ma...
âTis the Season for Holiday Shopping Scams
The holidays are typically the time of year for gifting presents to friends and family or donations to charity. Unfortunately, not-so-jolly fraudsters take advantage of this genero...
Scams Targeting Seniors
Scammers target seniors more aggressively than any other group. Recognizing the most common scams helps prevent your money and personal information from getting stolen.
IRS Identity Theft Season Begins Now
Each year thieves try to steal billions in federal withholdings by stealing your identity. As the IRS focuses more attention on this quickly growing problem, now is the time of yea...
Five Ways to Protect Your Finances from Fraud
With fraud on the rise, itâs important to understand how to best protect yourself and your financial accounts. Here are five ways you can stay proactive to avoid fraudulent credit ...
Summer 2023 Tax Deadlines and IRS News
Upcoming Tax Deadlines June 15 â Second quarter 2023 individual estimated tax payments are due. August 1 â Due date for filing 2022 retirement or employee benefit plan returns (550...
Avoid IRS Phishing Schemes
Tax season is a prime opportunity for identity thieves who target your personal information through phishing scams.
Scammers Team Up
In this post, learn ore about recent cyber attacks and how to avoid them.
The Worldâs Identity Platform
Learn about the new Trulioo integrated, high-speed, global identity platform that helps your organization foster growth, innovation and trust.
What is a Money Mule Scam?
A Money Mule Scam occurs when the victim, often unknowingly, acts as a âmuleâ to transfer money so criminals can avoid financial institutions.
Recognizing Lonely Heart Scams
Among the most insidious types of fraud we see are Lonely Heart, or Romance Scams, because they combine traditional theft with emotional betrayal of someone who has built a relatio...