Latest Articles

Threat Reports, ESET Research

ESET Threat Report T2 2021

ESET Threat Report T2 2021

Threat Reports, ESET Research

ESET Threat Report T2 2021

A view of the T2 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč30 Sep 2021


Business Security

CISA and NSA release guidance for securing VPNs

CISA and NSA release guidance for securing VPNs

Business Security

CISA and NSA release guidance for securing VPNs

What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks

Amer Owaida29 Sep 2021


Digital Security

Google releases emergency fix to plug zero-day hole in Chrome

Google releases emergency fix to plug zero-day hole in Chrome

Digital Security

Google releases emergency fix to plug zero-day hole in Chrome

The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes

Amer Owaida27 Sep 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET unmasks FamousSparrow APT group – Stopping cloud data leaks – European cybercrime ring busted

Editor24 Sep 2021


Digital Security

Bug in macOS Finder allows remote code execution

Bug in macOS Finder allows remote code execution

Digital Security

Bug in macOS Finder allows remote code execution

While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented

Amer Owaida23 Sep 2021


ESET Research

FamousSparrow: A suspicious hotel guest

FamousSparrow: A suspicious hotel guest

ESET Research

FamousSparrow: A suspicious hotel guest

Yet another APT group that exploited the ProxyLogon vulnerability in March 2021

Tahseen Bin Taj and Matthieu Faou23 Sep 2021


Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.

Phil Muncaster22 Sep 2021


Cybercrime

European police dismantle cybercrime ring with ties to Italian Mafia

European police dismantle cybercrime ring with ties to Italian Mafia

Cybercrime

European police dismantle cybercrime ring with ties to Italian Mafia

The group used phishing, BEC and other types of attacks to swindle victims out of millions

Amer Owaida21 Sep 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Analysis of Numando banking trojan, steps to mitigate attack surface, and more! – Week in security with Tony Anscombe

Editor17 Sep 2021


ESET Research

Numando: Count once, code twice

Numando: Count once, code twice

ESET Research

Numando: Count once, code twice

The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.

ESET Research17 Sep 2021


Digital Security

Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

Digital Security

Microsoft Patch Tuesday fixes actively exploited zero-day and 85 other flaws

The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML.

Amer Owaida15 Sep 2021


Social Media

WhatsApp announces end-to-end encrypted backups

WhatsApp announces end-to-end encrypted backups

Social Media

WhatsApp announces end-to-end encrypted backups

The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks.

Amer Owaida14 Sep 2021


Threat Report
MSP Program