Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
ESET Research Podcast: Sextortion, digital usury and SQL brute-force
Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
ESET Research • 12 Sep 2023
Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor
ESET Research uncovers the Sponsoring Access campaign, which utilizes an undocumented Ballistic Bobcat backdoor we have named Sponsor
Adam Burgher • 11 Sep 2023
Video
Will you give X your biometric data? – Week in security with Tony Anscombe
The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured
Editor • 08 Sep 2023
Business Security
Staying ahead of threats: 5 cybercrime trends to watch
New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought
Phil Muncaster • 06 Sep 2023
Scams
Getting off the hook: 10 steps to take after clicking on a phishing link
Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.
Roman Cuprik • 04 Sep 2023
Fake Signal and Telegram apps – Week in security with Tony Anscombe
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites
Editor • 31 Aug 2023
What you need to know about iCloud Private Relay
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend — but is it a true VPN service? The devil is in the details.
Márk Szabó • 31 Aug 2023
BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs
Lukas Stefanko • 30 Aug 2023
Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?
The campaign started with a trojanized version of unsupported financial software
Roman Cuprik • 28 Aug 2023
How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe
ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud people out of their money
Editor • 25 Aug 2023
Telekopye: Hunting Mammoths using Telegram bot
Analysis of Telegram bot that helps cybercriminals scam people on online marketplaces
Radek Jizba • 24 Aug 2023
Scarabs colon-izing vulnerable servers
Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle
Jakub Souček • 22 Aug 2023
Digital Security
Top 5 search engines for internet-connected devices and services
How To
Common Facebook scams and how to avoid them
Borrower beware: Common loan scams and how to avoid them
Mobile Security
Silent but deadly: The rise of zero-click attacks
Sign up for our newsletters