Cybersecurity
Cybersecurity
BladedFeline: Whispering in the dark
In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT group behind the attacks is...
Hardware Releases
QLC Vs PLC SSDs – Which One Provides Better Data Storage Solutions In 2025?
Introduction: QLC Vs PLC SSDs in 2025
The debate about SSD technologies is becoming increasingly important with the rising...
Software Updates & Reviews
Google Pay inside sandboxed iframe for PCI DSS v4 compliance
If you are developing or maintaining a checkout page you might come across PCI...
Gaming & Graphics
How to find and get Flour Sand in Dune: Awakening
Flour Sand is one of the most dangerous items in Dune: Awakening, as the only area to collect...
Danabot under the microscope
ESET Research has been tracking Danabot’s activity since 2018 as part of...
Have I Been Pwned 2.0 is Now Live!
This has been a very long time coming, but finally, after a...
DragonForce targets rivals in a play for dominance – Sophos News
DragonForce is not just another ransomware brand – it’s a destabilizing force trying to reshape the ransomware landscape. Counter Threat Unit (CTU) researchers are...
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector.
"The ClickFix technique...
3AM ransomware actors dropped virtual machine with vishing and Quick Assist – Sophos News
Ransomware is usually a crime of opportunity. Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge devices...
Dero miner spreads inside containerized Linux environments
Introduction
Imagine a container zombie outbreak where a single infected container scans the internet for an exposed Docker API, and bites exploits it by creating...