A new version of our earlier report on major trends in Windows exploitation and mitigation for 2016.
“Our analysis of the current state and evolution of technology reveals one aspect that stands out,” notes ESET Research Laboratories in its annual trends paper. “More and more devices and technologies mean greater challenges when it comes to maintaining information security, regardless of the area of implementation.”
The full whitepaper “En Route with Sednit,” compiling parts 1-3.
In the third and final part of our whitepaper “En Route with Sednit,” we describe a special downloader named Downdelph.
In the second part of our whitepaper “En Route with Sednit”, we focus on Sednit’s espionage toolkit, which is deployed on targets deemed interesting after a reconnaissance phase (described in the first part of the whitepaper).
In the first part of our whitepaper “En Route with Sednit”, we focus on the methods used by the group to attack its targets, and on who these targets are.
A journey in the land of (Cyber-) espionage – stunning presentation by ESET researchers JoanCalvet, Jessy Campos and Thomas Dupuy. Visiting the Bear Den from ESET
As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.
Operation Groundbait (Russian: Прикормка, Prikormka) is an ongoing cyber-surveillance operation targeting individuals in Ukraine. The group behind this operation has been launching targeted and possibly politically-motivated attacks to spy on individuals. This paper presents ESET’s findings about Operation Groundbait based on our re- search into the Prikormka malware family.
Over the last four decades, the privacy of personal data has been the subject of legislation and litigation in both the US and the EU. Protection of personal data privacy under the law has been shaped by the interests of multiple constituencies: individuals, commercial organizations, government agencies, law enforcement, and national security services.
Ransomware is a growing problem for users of mobile devices. Lock-screen types and fine-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. This report discusses further.
The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers.
A presentation by Jean-Ian Boutin, Anton Cherepanov and Jan Matušík, detailing Operation Buhtrap. Operation Buhtrap – AVAR 2015 from ESET
“Security is no longer just a problem for a few individuals but rather a problem involving more and more people”, explains ESET Research Laboratories in its annual trends paper. “2016 will be a most challenging year. We must face it with a proactive attitude of security awareness. “
A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.
Windows 10: Should you go there?
How Safe are Australian Children in the Internet Age?
Is Anti-Virus dead?
Marcin Hartung looks at different .NET packer tricks of the trade and the countermeasures deployed to deal with them.
Operation Potao Express: Analysis of a cyber-espionage toolkit