Putting a precision payload on top of more generic malware makes perfect sense for malware operators
ESET researchers discover a malware family with tools that show signs they’re used in targeted attacks
Cryptocurrencies rise and fall, but one thing stays the same – cybercriminals attempt to cash in on the craze
ESET research discovers a previously undocumented UEFI bootkit with roots going back all the way to at least 2012
Yet another APT group that exploited the ProxyLogon vulnerability in March 2021
The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.
Meet SparklingGoblin, a member of the Winnti family
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers
The first in our series on IIS threats looks at a malicious IIS extension that intercepts server transactions to steal credit card information
ESET researchers publish a white paper putting IIS web server threats under the microscope
On iOS we have seen link shortener services pushing spam calendar files to victims’ devices.
ESET Research uncovers an active malicious campaign that uses new versions of old malware, Bandook, to spy on its victims
ESET researchers discover a new campaign that evolved from the Quarian backdoor
ESET researchers shed light on new campaigns from the quiet Gelsemium group
We will explore two threats – Android stalkerware and XP exploits
Another in our occasional series demystifying Latin American banking trojans
Authorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities
ESET researchers discover a new Lazarus backdoor deployed against a freight logistics firm in South Africa
How can organizations tackle the growing menace of attacks that shake trust in software?