AI and AI-generated deepfakes are proving to be the most intriguing, and in some ways troubling, recent...
Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the...
Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian...
Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design...
Researchers at ReliaQuest have published a report looking at cyber threats surrounding the upcoming US presidential election,...
Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet service providers (ISPs) as...
An advanced threat actor with an India nexus has been observed using multiple cloud service providers to...
Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
1 min read
ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities...
As many as 25 websites linked to the Kurdish minority have been compromised as part of a...
Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for...