The term Fast Flux can refer to networks used by several botnets to hide the domains used to download malware or host phishing websites, says Josep Albors.
ESET's Peter Kálnai and Michal Malik report on a new Linux/Rakos threat - devices and servers are under SSH scan again.
ESET's Anton Cherepanov Jean-Ian Boutin discuss their paper, titled Modern Attacks on Russian Financial Institutions, which was published earlier this year.
Visiting popular websites and getting infected without any interaction? ESET explains how the stealthy Stegano exploit kit, hiding in the pixels of malicious ads, is capable of performing this dirty job.
A year after its disruption on 2nd December 2015, We Live Security looks at life after Dorkbot.
Earlier this week coordinated law enforcement action took down the Avalanche fast-flux network. ESET has been assisting in the cleanup.
As many as 900,000 Deutsche Telekom customers were knocked offline on Sunday and Monday as an attempt was made to hijack broadband routers into a botnet.
Hackers broke into the MailChimp accounts of some businesses, and send out malicious invoice emails to subscribers... but that doesn't mean that MailChimp suffered a serious security breach. Once again, two-factor authentication could have saved users' bacon.
The Conficker worm was huge news when it emerged towards the end of 2008, exploiting millions of Windows devices. Today, it remains one of the most pervasive malware families around the globe.
This feature offers a very digested read of ESET's trilogy of research papers on Sednit, one of the most notorious groups of cyberattackers in the world.
Tesco Bank, which recently saw thousands of its customers lose funds to cybercriminals, has been found on the target list of the so-called Retefe malware.
There are a great many tools available to help quickly analyze the behavior of mobile malware samples. In the case of Android, one such app is AppMon.
On November 2nd 1988, the Morris Worm was released, bringing the internet to an effective standstill. It was a seminal moment in internet history.
For the past year, ESET and the security firm GoSecure combined their skills in order to research Linux/Moose further. Here's some of what was uncovered.
As we continue to do more things with our smartphones, the threat posed by mobile malware increases. Here's a short history of its development.
It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.
ESET's threat analysts have taken a closer look at the software used by Sednit to spy on its targets and steal confidential information.
Security researchers at ESET have released their latest research into the notorious and highly experienced Sednit cyberespionage group.
Within a few hours of being released in the winter of 2003, SQL Slammer had brought the internet to something of a standstill. We look back at this notable worm.
ESET's latest research analyzes a piece of malware active since 2012, but which has targeted one specific country – Libya.