There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud
Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies, plus other interesting findings from ESET's new Threat Report
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves
Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Donβt torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves β and your entire organization
The importance of understanding β and prioritizing β the privacy and security implications of large language models like ChatGPT cannot be overstated
As all things (wrongly called) AI take the worldβs biggest security event by storm, we round up of some of their most-touted use cases and applications
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
The much-dreaded writerβs block isnβt the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured