ESET researchers have discovered a new variant of botnet-forming Android banking malware based on source code made public a couple of months ago.
ESET has spotted a new banking malware on Google Play. Disguised as a weather forecast app, it steals banking credentials and locks screens.
The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland.
Android users are exposed to a new malicious app imitating Adobe Flash Player and serving as an entrance gate for potentially any kind of dangerous malware
With analysts predicting a big shift to Windows 10 in the enterprise in 2017, a new ESET white paper looks at security and privacy changes in Windows 10 Anniversary Update, the build that Microsoft expects its business customers to run on the majority of their desktop computers.
ESET has discovered a Linux variant of the KillDisk component that renders Linux machines unbootable, while encrypting files and requesting a large ransom at the same time.
ESET’s Peter Kálnai and Michal Malik report on a new Linux/Rakos threat – devices and servers are under SSH scan again.
ESET’s Anton Cherepanov analyzes the work of TeleBots, a malicious toolset that was used in focused cyberattacks against targets in Ukraine’s financial sector.
Millions of readers who visit popular news websites have been targeted by a series of malicious ads redirecting them to the Stegano exploit kit.
Tesco Bank, which recently saw thousands of its customers lose funds to cybercriminals, has been found on the target list of the so-called Retefe malware.
ESET’s threat analysts have taken a closer look at the software used by Sednit to spy on its targets and steal confidential information.
Criminals are hunting for routers with default credentials and with vulnerabilities in their firmware, with Brazilians the main target.
Security researchers at ESET have released their latest research into the notorious and highly experienced Sednit cyberespionage group.
ESET has carried out analysis of new samples of the crypto-ransomware family TorrentLocker, to compare the 2016 campaigns against its research in late 2014.
During the last hours, OSX/Keydnap was distributed on a trusted website, which turned out to be “something else”. It spread via a recompiled version of the otherwise legitimate open source BitTorrent client application Transmission and distributed on their official website.