Endpoint protection and response platforms cover everything from AI-powered ransomware detection to insider risk monitoring.
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
The ransomware evolution: Rise of EDR killers, AI-powered malware By Christopher Tredger, Technology Portals editor, ITWebJohannesburg, 06 Feb 2026Tony Anscombe, chief security evangelist at ESET. The ...
Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
Key cyber updates on ransomware, cloud intrusions, phishing, botnets, supply-chain risks, and nation-state threat activity.
How AI and agentic AI are reshaping malware and malicious attacks, driving faster, stealthier, and more targeted ...
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector.
This article explores the critical role of Independent Software Vendors (ISVs) in defending their customers against the escalating threat of ransomware. By analyzing recent attack trends and the shift ...
The world of Stranger Things is packed with eerie surprises: hidden portals, shapeshifting monsters, and threats that look ...
Cybercriminals are happy to target almost any industry where data can be stolen. In many cases, less prepared and less security-focused companies are simply easier targets. A recent ransomware attack ...
Common failures in security that enable vulnerabilities to be exploited, as well as the politicisation of technology leading to its use by nation-states for cyber crime, were among the biggest issues ...
Thembekile Olivia Mayayise does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results