Latest Articles

ESET Research

Fake e-shops on the prowl for banking credentials using Android malware

Fake e-shops on the prowl for banking credentials using Android malware

ESET Research

Fake e-shops on the prowl for banking credentials using Android malware

ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks

Lukas Stefanko06 Apr 2022


Cybercrime

We’re going on Tor

We’re going on Tor

Cybercrime

We’re going on Tor

If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.

Jake Moore05 Apr 2022


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Under the hood of Wslink's VM – The energy sector & cyber-risk – SMB cybersecurity survival tips

Editor01 Apr 2022


Business Security

Cybersecurity survival tips for small businesses

Cybersecurity survival tips for small businesses

Business Security

Cybersecurity survival tips for small businesses

How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals?

André Lameiras01 Apr 2022


Women in tech: Unique insights from a lifelong quest for innovation

Women in tech: Unique insights from a lifelong quest for innovation

Women in tech: Unique insights from a lifelong quest for innovation

Leading Slovak computer scientist Mária Bieliková shares her experience working as a woman driving technological innovation and reflects on how to inspire the next generation of talent in tech

Alžbeta Kovaľová30 Mar 2022


Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center, Business Security

Europe's quest for energy independence – and how cyber-risks come into play

Europe's quest for energy independence – and how cyber-risks come into play

Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center, Business Security

Europe's quest for energy independence – and how cyber-risks come into play

Soaring energy prices and increased geopolitical tensions amid the Russian invasion of Ukraine bring a sharp focus on European energy security

André Lameiras and James Shepperd29 Mar 2022


ESET Research

Under the hood of Wslink’s multilayered virtual machine

Under the hood of Wslink’s multilayered virtual machine

ESET Research

Under the hood of Wslink’s multilayered virtual machine

ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques

Vladislav Hrčka28 Mar 2022


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET discovers Mustang Panda's Hodur trojan – Crypto malware targeting Android and iOS users alike – Nation-state digital deterrent

Editor25 Mar 2022


Ukraine Crisis – Digital Security Resource Center, Business Security

Is a nation-state digital deterrent scenario so far-fetched?

Is a nation-state digital deterrent scenario so far-fetched?

Ukraine Crisis – Digital Security Resource Center, Business Security

Is a nation-state digital deterrent scenario so far-fetched?

Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown?

Tony Anscombe24 Mar 2022


ESET Research

Crypto malware in patched wallets targeting Android and iOS devices

Crypto malware in patched wallets targeting Android and iOS devices

ESET Research

Crypto malware in patched wallets targeting Android and iOS devices

ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets

Lukas Stefanko24 Mar 2022


ESET Research

Mustang Panda’s Hodur: Old tricks, new Korplug variant

Mustang Panda’s Hodur: Old tricks, new Korplug variant

ESET Research

Mustang Panda’s Hodur: Old tricks, new Korplug variant

ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine

Alexandre Côté Cyr23 Mar 2022


Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Sandworm: A tale of disruption told anew

Sandworm: A tale of disruption told anew

Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Sandworm: A tale of disruption told anew

As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again

Rene Holt21 Mar 2022