OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers
The fraudsters ran their campaigns from the cloud and used phishing and email forwarding rules to steal their targets' financial information.
How do vishing scams work, how do they impact businesses and individuals, and how can you protect yourself, your family and your business?
ESET Research dissects campaigns by the Gelsemium and BackdoorDiplomacy APT groups – Hacking an orbiting satellite isn't necessarily the stuff of Hollywood
Should we expect cybercriminals to ditch the pseudonymous cryptocurrency for other forms of payment that may be better at throwing law enforcement off the scent?
The latest Chrome update patches a bumper crop of security flaws across the browser’s desktop versions
ESET researchers discover a new campaign that evolved from the Quarian backdoor
ESET researchers shed light on new campaigns from the quiet Gelsemium group
Law enforcement around the world used a messaging app called AN0M to monitor the communications of alleged criminals
Hacking an orbiting satellite is not light years away – here’s how things can go wrong in outer space
New ESET Threat Report is out – How to deal with online trolls – Teens, beware these 5 common scams
Websites using Fancy Product Designer are susceptible to remote code execution attacks even if the plugin is deactivated
A view of the T 1 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
From knock-off designer products to too-good-to-be-true job offers, here are five common schemes fraudsters use to trick teenagers out of their money and sensitive data
You may not be able to escape internet trolls, but you have a choice about how you will deal with them – here’s how you can handle trolls without losing your cool
You, too, may be vulnerable to SIM swap attacks – How to defend yourself against rom-cons – Zero day in macOS allowed malware to take secret screenshots
Here’s how easily your phone number could be stolen, why a successful SIM swap scam is only the beginning of your problems, and how you can avoid becoming a victim of the attack
Patches to remedy the vulnerabilities should be released over the coming weeks
You would do well to update to macOS Big Sur 11.4 post-haste
Online dating scams often follow the same script – here’s what senior citizens should watch out for and how their younger relatives can help them avoid falling victim