COMMENTARYMitigating third-party risk may seem daunting when considering the slew of incoming regulations coupled with the increasingly advanced tactics of cybercriminals. However, most organizations...
Since the new 14.6 Patch released this past Tuesday, new changes have reached Howling Abyss champions. With one exciting fresh balance change, and one...
There have been a lot of inventions over the course of history that revolutionised the way people handle their business processes. From clay tablets...
Security teams are facing "the perfect storm" these days, with four seemingly major contributing factors at play: AI and generative AI; geopolitical dynamics; changing...
A newly discovered type of self-perpetuating denial-of-service (DoS) attack targeting application-layer messages has the potential to compromise 300,000 Internet hosts and can be difficult...
Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...
A malicious email campaign is targeting hundreds of Microsoft Office users in US-based organizations to deliver a remote access trojan (RAT) that evades detection,...