Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
The ransomware evolution: Rise of EDR killers, AI-powered malware By Christopher Tredger, Technology Portals editor, ITWebJohannesburg, 06 Feb 2026Tony Anscombe, chief security evangelist at ESET. The ...
Chrome and Edge users warned about NexShield browser extension scam that causes crashes and tricks users into installing ...
Allison Nixon had helped arrest dozens of members of The Com — a loose affiliation of online groups responsible for violence and hacking campaigns. Then she became a target.
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector.
With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or ...
Worm-driven TeamPCP campaign exploits Docker, Kubernetes, Redis, Ray, and React2Shell to build proxy infrastructure for data theft and ransomware.
The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and ...
When ransomware attacks hit the headlines and data breaches dominate the news cycle, cybersecurity stocks tend to rally. But ...
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
“There is no direct attribution associated with the source IPs, though the activity is consistent with known malicious ...
Cybersecurity deserves better than blind trust. 909Select offers vetted freelance talent with zero-trust hiring built ...