Latest Articles

Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET researchers analyze malware frameworks targeting air-gapped networks – ESET Research launches a podcast – INTERPOL cracks down on online fraud

Editor03 Dec 2021


COVID-19

Scammers exploit Omicron fears in new COVID-19 phishing campaign

Scammers exploit Omicron fears in new COVID-19 phishing campaign

COVID-19

Scammers exploit Omicron fears in new COVID-19 phishing campaign

Fraudsters take advantage of the emergence of the new variant to dupe unsuspecting victims out of their sensitive data

Amer Owaida03 Dec 2021


ESET Research

Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

ESET Research

Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Press play for the first episode as host Aryeh Goretsky is joined by Zuzana Hromcová to discuss native IIS malware

Roman Kováč02 Dec 2021


ESET Research

Jumping the air gap: 15 years of nation-state effort

Jumping the air gap: 15 years of nation-state effort

ESET Research

Jumping the air gap: 15 years of nation-state effort

ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs

Alexis Dorais-Joncas and Facundo Muñoz01 Dec 2021


Cybercrime

More than 1,000 arrested in global crackdown on online fraud

More than 1,000 arrested in global crackdown on online fraud

Cybercrime

More than 1,000 arrested in global crackdown on online fraud

The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains

Amer Owaida29 Nov 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice

Editor26 Nov 2021


Scams

The triangle of holiday shopping: Scams, social media and supply chain woes

The triangle of holiday shopping: Scams, social media and supply chain woes

Scams

The triangle of holiday shopping: Scams, social media and supply chain woes

‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products

Tony Anscombe25 Nov 2021


How To

Avoiding the shopping blues: How to shop online safely this holiday season

Avoiding the shopping blues: How to shop online safely this holiday season

How To

Avoiding the shopping blues: How to shop online safely this holiday season

With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is safe

Amer Owaida24 Nov 2021


Critical Infrastructure, Business Security

FBI, CISA urge organizations to be on guard for attacks during holidays

FBI, CISA urge organizations to be on guard for attacks during holidays

Critical Infrastructure, Business Security

FBI, CISA urge organizations to be on guard for attacks during holidays

Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends

Amer Owaida23 Nov 2021


How To

What to do if you receive a data breach notice

What to do if you receive a data breach notice

How To

What to do if you receive a data breach notice

Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed

Phil Muncaster22 Nov 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved

Editor19 Nov 2021


Digital Security

CYBERWARCON – Foreign influence operations grow up

CYBERWARCON – Foreign influence operations grow up

Digital Security

CYBERWARCON – Foreign influence operations grow up

Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.

Cameron Camp19 Nov 2021