The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.
Meet SparklingGoblin, a member of the Winnti family
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers
The first in our series on IIS threats looks at a malicious IIS extension that intercepts server transactions to steal credit card information
ESET researchers publish a white paper putting IIS web server threats under the microscope
On iOS we have seen link shortener services pushing spam calendar files to victims’ devices.
ESET Research uncovers an active malicious campaign that uses new versions of old malware, Bandook, to spy on its victims
ESET researchers discover a new campaign that evolved from the Quarian backdoor
ESET researchers shed light on new campaigns from the quiet Gelsemium group
We will explore two threats – Android stalkerware and XP exploits
Another in our occasional series demystifying Latin American banking trojans
Authorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities
ESET researchers discover a new Lazarus backdoor deployed against a freight logistics firm in South Africa
How can organizations tackle the growing menace of attacks that shake trust in software?
ESET Research uncovers a new threat that targets organizations operating in various sectors in Brazil
Had the incident gone unnoticed, the attackers could have taken over websites using the tainted code
ESET Research has found LuckyMouse, Tick, Winnti Group, and Calypso, among others, are likely using the recent Microsoft Exchange vulnerabilities to compromise email servers all around the world
A primer on various threats looming over financial companies and the steps that these organizations can take to counter them
The first instance of malicious code native to Apple Silicon M1 Macs emerged a month after the release of devices equipped with the company’s in-house CPUs