
Quishing: when QR codes become invisible attack vectors
Quishing: when the QR code becomes an invisible attack vector In 2025, phishing e-mails containing a malicious QR code rose from 47,000 in August to
Cybersecurity is an essential area of IT that focuses on protecting systems, networks and data from digital threats. It encompasses a variety of practices, tools and technologies designed to prevent attacks, damage and unauthorized access to information and systems. As our dependence on digital technologies increases, the need to secure our digital information and infrastructures becomes ever more crucial.
Cybersecurity threats can take many forms, from malware such as viruses and ransomware to phishing attacks and data breaches. In the face of these ever-evolving threats, cybersecurity professionals are working tirelessly to develop new methods of defense, raise public and corporate awareness of the importance of digital security, and ensure a safer online environment for all.

Quishing: when the QR code becomes an invisible attack vector In 2025, phishing e-mails containing a malicious QR code rose from 47,000 in August to

ESET security researchers have identified a new threat in the Android ecosystem. Called PromptSpy, this malware represents the first known use of generative artificial intelligence

The cybercriminal group Nitrogen has just suffered an embarrassing mishap that turns their ransomware into a tool for outright destruction. A programming error in their

A massive identity theft campaign is currently hitting over 100 leading companies worldwide. Behind this offensive is the cybercriminal alliance Scattered LAPSUS$ Hunters (SLSH), which

Industry observers agree on one thing: the year 2026 marks a shift in the very nature of cyberattacks. Artificial intelligence no longer simply assists attackers,

On January 5, 2026, British carmaker Jaguar Land Rover released its preliminary figures for the third quarter of fiscal 2026. These results confirm the scale

Generative artificial intelligence is revolutionizing business productivity, with 71% of organizations now using it on a regular basis. But like all powerful technologies, large-scale language

Gone are the days when ransomware simply encrypted data for ransom. For several years now, cybercriminals have been transforming their business model by adding a

A simple command line can infect your PC. The ClickFix attack, which exploits Internet users’ trust in familiar interfaces, has seen explosive growth since 2024.

Attackers from the Qilin group have taken their operations to a new level of sophistication by deploying a Linux variant of their ransomware directly on

September 5, 2025 marks the appearance of Yurei, a new ransomware group whose name evokes the spirits of Japanese folklore. This emergence illustrates a worrying

A new strain of ransomware dubbed HybridPetya was revealed by ESET Research researchers in September 2025. This sophisticated malware represents a worrying fusion between the