ESET analysis breaks down the first known spyware that is built on the AhMyth open-source espionage tool and has appeared on Google Play – twice
This week, ESET researchers described an ongoing campaign that targets accountants in the Balkans and spreads both a backdoor and a remote access trojan
How schools and educators can address and help prevent abusive behavior on the internet
The attack, which has victimized mostly smaller local governments, is thought to have been unleashed by a single threat actor
ESET research uncovers the first known instances of spyware that is based on the AhMyth Remote Access Tool and has snuck into Google Play
This week, we present an introduction to the MITRE ATT&CK framework, the review of the mobile threats and vulnerabilities detected for mobile during the first half of 2019, and Firefox 69 new features.
Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported increased.
Are you – and especially your children – aware of the risks that may come with sharing selfies?
In almost all tested units, the researchers achieved their goal of obtaining remote root-level access
ESET researchers found an undocumented backdoor used by the infamous Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East. With the launch of the Safer Kids online initiative, a guide to help parents protect their kids when they take selfie. The discovery of a serious vulnerability
The humongous collection of extensive personal details about millions of people could be a gold mine for scam artists
Número dois in our series demystifying Latin American banking trojans
Many companies are ranking cybersecurity as a top 5 priority but their actions do not measure up to the claim, a survey finds
A nationwide data leak is believed to affect almost all citizens of Ecuador, putting them at risk of identity theft
There is no word on which threat actor is abusing the severe vulnerability for attacks
The UK’s cybersecurity agency also outlines precautions that academia should take to mitigate risks
Almost 60% of second-hand hard drives hold leftover data from previous owners, a study shows
The bug, which has already been fixed by Facebook, allowed access to private user information that could be abused by malicious actors.
October is upon us, reminding us to make choices every day that will scare cybersecurity threats away
An introduction to the MITRE ATT&CK framework and how it can help organize and classify various types of threats and adversarial behaviors.