Latest Articles

Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

GoldenJackal jumps the air gap … twice  – Week in security with Tony Anscombe

Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities

Editor11 Oct 2024


ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms

Jakub Souček and Radek Jizba10 Oct 2024


Business Security

Cyber insurance, human risk, and the potential for cyber-ratings

Cyber insurance, human risk, and the potential for cyber-ratings

Business Security

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?

Tony Anscombe08 Oct 2024


ESET Research

Mind the (air) gap: GoldenJackal gooses government guardrails

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal

Matías Porolli07 Oct 2024


Video

The complexities of attack attribution – Week in security with Tony Anscombe

The complexities of attack attribution – Week in security with Tony Anscombe

Video

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week

Editor04 Oct 2024


ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia

Romain Dumont02 Oct 2024


Business Security

Why system resilience should mainly be the job of the OS, not just third-party applications

Why system resilience should mainly be the job of the OS, not just third-party applications

Business Security

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience

Tony Anscombe01 Oct 2024


Digital Security

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Digital Security

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices

Tony Anscombe01 Oct 2024


Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years

Editor27 Sep 2024


ESET Research

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine

Zoltán Rusnák26 Sep 2024


Digital Security

Don’t panic and other tips for staying safe from scareware

Don’t panic and other tips for staying safe from scareware

Digital Security

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics

Phil Muncaster25 Sep 2024


Kids Online

Time to engage: How parents can help keep their children safe on Snapchat

Time to engage: How parents can help keep their children safe on Snapchat

Kids Online

Time to engage: How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app

Phil Muncaster24 Sep 2024


Apt Activity Report
MDR Protection