ESET researchers publish a white paper putting IIS web server threats under the microscope
Meet SparklingGoblin, a member of the Winnti family
The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers
The first in our series on IIS threats looks at a malicious IIS extension that intercepts server transactions to steal credit card information
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
ESET researchers have investigated a targeted mobile espionage campaign against the Kurdish ethnic group, and that has been active since at least March 2020.
From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims
On iOS we have seen link shortener services pushing spam calendar files to victims’ devices.
As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud?
One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin
How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?
Vaccination passports may facilitate the return to normalcy, but there are also concerns about what kinds of personal data they collect and how well they protect it. Here’s what you should know.
With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation.
Drowning in spam? A study presented at Black Hat USA 2021 examines if sharing your personal information with major companies contributes to the deluge of nuisance emails, texts and phone calls.
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
Who is actually paying the ransom demand? – Be careful about what you throw away – Records from a terrorist watchlist exposed online
The man was after sexually explicit photos and videos that he would then share online or store in his own collection
Ransomware payments may have greater implications than you thought – and not just for the companies that paid up
The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.