Join Our Newsletter
Join our subscribers list to get the latest news, updates and special offers directly in your inbox
Russian cyber threat actors have been attributed to a state-sponsored campaign t...
Russian organizations have become the target of a phishing campaign that distrib...
Counterfeit Facebook pages and sponsored ads on the social media platform are be...
Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to prac...
It takes just one email to compromise an entire system. A single well-crafted me...
Cybersecurity researchers have discovered a new campaign that employs malicious ...
Google has announced a new feature in its Chrome browser that lets its built-in ...
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the la...
An overview of the activities of selected APT groups investigated and analyzed b...
An unknown threat actor has been attributed to creating several malicious Chrome...
Cybersecurity researchers have discovered risky default identity and access mana...
High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have e...
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud re...
Cybersecurity researchers are calling attention to a new Linux cryptojacking cam...
Cybersecurity researchers have uncovered malicious packages uploaded to the Pyth...
In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISO...