The AI race is on! Itβs easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what the hype is about. Heydays for cybercriminals!
DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event's venue due to a bomb threat
Unsurprisingly, artificial intelligence took the center stage at this year's edition of Black Hat, one of the world's largest gatherings of cybersecurity professionals
Listen as ESET's Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies in Belarus
Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks⦠Sounds like the infamous Turla? Think again!
Gamers and cybersecurity professionals have something in common β the ever-terrible presence of hacking, scams, and data theft β but how and why would anyone want to target gamers?
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?
With powerful AI, it doesnβt take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud
Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies, plus other interesting findings from ESET's new Threat Report
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves
Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms