News
The calm before the ransomware storm: What you see is not all there is
1+ hour, 44+ min ago (437+ words) A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability Or, viewed through another lens, the absence of a visible incident is just silence, and silence can mean several things. The company with…...
Supply chain dependencies: Have you checked your blind spot?
1+ week, 1+ day ago (359+ words) Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience? Some cyber business risks only show up when you take a closer look. Supply chain blind spots are a…...
Supply-chain dependencies: Check your risk blind spot
8+ mon, 1+ week ago (294+ words) Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them? Turning the conversation to whether a war could be won using cyberattacks and digital disruption, there was also agreement among the…...
A qu" riesgos puedes exponerte al buscar servicios de streaming gratuitos, an'lisis de Magis TV
7+ mon, 1+ week ago (739+ words) La b'squeda de opciones de streaming gratuitas puede exponerte a malware, robo de datos y problemas legales. Analizamos Magis TV como uno de los ejemplos de estos riesgos. La adopci'n de aplicaciones de streaming desde la pandemia y pospandemia ha…...
As breakout time accelerates, prevention-first cybersecurity takes center stage
2+ week, 3+ day ago (423+ words) Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy. But n the other hand, threat actors are just doing what they have done before " supercharging existing tactics, techniques…...
This month in security with Tony Anscombe " March 2026 edition
3+ week, 3+ day ago (165+ words) The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan As March 2026 draws to a close, ESET Chief Security Evangelist Tony Anscombe looks at some of the…...
RSAC 2026 wrap-up " Week in security with Tony Anscombe
4+ week, 41+ min ago (185+ words) This year, AI agents took the center stage " as a defensive capability, but more pressingly as a risk many organizations haven't caught up with That's a wrap on the RSAC" 2026 Conference. For its 35th edition, the conference drew the usual mix…...
A cunning predator: How Silver Fox preys on Japanese firms this tax season
4+ week, 4+ hour ago (385+ words) Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them Japan has entered its annual tax filing and organizational change season, a period when companies generate…...
Virtual machines, virtually everywhere " but not all protected
4+ week, 2+ day ago (535+ words) Cloud VMs offer unmatched speed, scale and flexibility " all of which could eventually count for little if they're left to fend for themselves Twenty years ago, almost to the day, Amazon Web Services (AWS)launched Simple Storage Service (S3). A few…...
Cloud workload security: Mind the gaps
1+ mon, 1+ hour ago (303+ words) As IT infrastructure expands, visibility and control often lag behind " until an incident forces a reckoning The ease with which some cloud assets, notably virtual machines, can be spun up contrasts sharply with the reality of keeping them hardened and…...