Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds
Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff.
Phishing and how to avoid taking the bait – Offboarding employees securely – Why old malware refuses to die
Putting a precision payload on top of more generic malware makes perfect sense for malware operators
There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?
If it looks like a duck, swims like a duck, and quacks like a duck, then it's probably a duck. Now, how do you apply the duck test to defend against phishing?
The attack, which clocked in at 2.4 Tbps, targeted an Azure customer based in Europe
The victims lost an average of nine days to downtime and two-and-a-half months to investigations, an analysis of disclosed attacks shows
ESET research discovers ESPecter bootkit – FontOnLake targeting Linux – Fake SafeMoon app update
ESET researchers discover a malware family with tools that show signs they’re used in targeted attacks
Two-factor authentication is a simple way to greatly enhance the security of your account
Cryptocurrencies rise and fall, but one thing stays the same – cybercriminals attempt to cash in on the craze
ESET research discovers a previously undocumented UEFI bootkit with roots going back all the way to at least 2012
New ESET Threat Report is out – Cybersecurity Awareness Month begins today – What organizations should do to secure their VPNs
The campaign may last for a month, but we should remember that cybersecurity is a year-round affair
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds
A view of the T2 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks
The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes
ESET unmasks FamousSparrow APT group – Stopping cloud data leaks – European cybercrime ring busted