Un aperçu des activités de certains groupes APT étudiés et analysés par ESET Research au cours des T2 2025 et T3 2025.
This issue of the ESET APT Activity Report reviews notable activities of APT groups that were documented by ESET researchers ...
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company.
Etsy est depuis longtemps une référence pour les créations artisanales uniques et les objets vintage rares. Mais peut-on ...
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and ...
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT ...
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data.
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you and ...
Les apparences sont parfois trompeuses : derrière l’icône familière d’un fichier PDF peut se cacher un logiciel malveillant ...
Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The individual began manipulating and transferring potentially harmful files, and tried to ...
Infostealers remain one of the most persistent threats on today’s threat landscape. They’re built to quietly siphon off valuable information, typically login credentials and financial and ...