The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland.
A game with love: How the LoveLetter virus corrupted our tech by playing on our emotions.
If you were trying to use the public computers at St Louis Public Library this week you may have experienced more than your fair share of problems.
This month’s Flashback Wednesday takes us back to the beginning. Pakistani Brain, discovered on January 19th, is considered to be the first-ever PC virus.
The term Fast Flux can refer to networks used by several botnets to hide the domains used to download malware or host phishing websites, says Josep Albors.
ESET's Peter Kálnai and Michal Malik report on a new Linux/Rakos threat - devices and servers are under SSH scan again.
ESET's Anton Cherepanov Jean-Ian Boutin discuss their paper, titled Modern Attacks on Russian Financial Institutions, which was published earlier this year.
Visiting popular websites and getting infected without any interaction? ESET explains how the stealthy Stegano exploit kit, hiding in the pixels of malicious ads, is capable of performing this dirty job.
A year after its disruption on 2nd December 2015, We Live Security looks at life after Dorkbot.
Earlier this week coordinated law enforcement action took down the Avalanche fast-flux network. ESET has been assisting in the cleanup.
As many as 900,000 Deutsche Telekom customers were knocked offline on Sunday and Monday as an attempt was made to hijack broadband routers into a botnet.
Hackers broke into the MailChimp accounts of some businesses, and send out malicious invoice emails to subscribers... but that doesn't mean that MailChimp suffered a serious security breach. Once again, two-factor authentication could have saved users' bacon.
The Conficker worm was huge news when it emerged towards the end of 2008, exploiting millions of Windows devices. Today, it remains one of the most pervasive malware families around the globe.
This feature offers a very digested read of ESET's trilogy of research papers on Sednit, one of the most notorious groups of cyberattackers in the world.
Tesco Bank, which recently saw thousands of its customers lose funds to cybercriminals, has been found on the target list of the so-called Retefe malware.
There are a great many tools available to help quickly analyze the behavior of mobile malware samples. In the case of Android, one such app is AppMon.
On November 2nd 1988, the Morris Worm was released, bringing the internet to an effective standstill. It was a seminal moment in internet history.
For the past year, ESET and the security firm GoSecure combined their skills in order to research Linux/Moose further. Here's some of what was uncovered.
As we continue to do more things with our smartphones, the threat posed by mobile malware increases. Here's a short history of its development.
It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.