Europeans face evolving cyberthreats. Defense strategies need to be robust and pragmatic

Guest speaker, Forrester Sr. analyst Tope Olufon explains how to stay resilient in Europe’s fluid threat landscape. Cybersecurity is a complicated and constantly changing endeavor requiring robust security solutions and services such as cyber threat intelligence, automated incident response, and managed detection and response (MDR). But having all of these is not enough, according to Tope … More Europeans face evolving cyberthreats. Defense strategies need to be robust and pragmatic

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response. We have seen AI morphing from answering simple chat questions for school homework to attempting to detect weapons in the New York subway, and now being found complicit in the conviction of a … More What happens when AI goes rogue (and how to stop it)

400k Linux servers compromised for cryptocurrency theft and financial gain

One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft. ESET Research released its deep-dive investigation into one of the most advanced server-side malware campaigns, which is still growing and has seen hundreds of thousands of … More 400k Linux servers compromised for cryptocurrency theft and financial gain

ESET APT Activity Report Q4 2023–Q1 2024

An overview of the activities of selected APT groups investigated and analysed by ESET Research in Q4 2023 and Q1 2024 ESET APT Activity Report Q4 2023–Q1 2024 summarises notable activities of selected advanced persistent threat (APT) groups that were documented by ESET researchers from October 2023 until the end of March 2024. The highlighted … More ESET APT Activity Report Q4 2023–Q1 2024

Reducing the complexity of security tasks with the involvement of AI

Practical design considerations implemented in key functionalities of cybersecurity solutions can go a long way toward increasing the impact of in-house security, while also reducing the sometimes-necessary complexity of their use. However, processing actionable data, be it detections or threat intelligence, is also complex and takes considerable capacity, manpower, and maturity. At the same time, … More Reducing the complexity of security tasks with the involvement of AI