Android ransomware is back
ESET researchers discover a new Android ransomware family that attempts to spread to victims’ contacts and deploys some unusual tricks
ESET researchers discover a new Android ransomware family that attempts to spread to victims’ contacts and deploys some unusual tricks
The fraudulent campaign is hosted by a domain that is home to yet more bogus offers pretending to come from other well-known brands
The power utility appears to be well on track to a swift recovery following an attack that ultimately left some people without electricity
The attack, unleashed by a 400,000-strong Mirai-style botnet, may be the largest of its kind on record
The compromised company may bear the financial brunt of the breach within the first year after the incident occurs, but the price tag is still far from final
On the flip side, there are currently no known cases of the vulnerability being exploited in the wild
ESET researchers discover fraudulent schemes piggybacking on the popularity of the face-modifying tool FaceApp, using a fake “Pro” version of the application as a lure
Tracking the malicious activities of the elusive Ke3chang APT group, ESET researchers have discovered new versions of malware families linked to the group, and a previously unreported backdoor
Keeping up with BlueKeep; or how many internet-facing systems, and in which countries and industries, remain ripe for exploitation?
A researcher found that it was possible to subvert the platform’s password recovery mechanism and take control of user accounts
What mounting public concern about falling victim to cybercrime says about government and corporate efforts at cybercrime deterrence
ESET research reveals notorious crime group also conducting espionage campaigns for the past five years
ESET research discovers a zero-day exploit that takes advantage of a local privilege escalation vulnerability in Windows
The times they have a-changed since the ICO could only slap fines worth a fraction of the current amounts
ESET researchers have discovered a malicious campaign distributing a backdoor via torrents, with Korean TV content used as a lure
A trifecta of issues impact the organization’s cyber-resilience and conspire to put it in the firing line of cyberattacks
The leak, which has since been plugged, exposed a range of highly specific and sensitive information about users
“Sounds bad”, the former Equifax CIO wrote in a text after learning of the breach that ended up affecting almost half the US population