Latest Articles

What every business leader needs to know about Log4Shell

What every business leader needs to know about Log4Shell

What every business leader needs to know about Log4Shell

Hundreds of thousands of attempts to exploit the vulnerability are under way

Rene Holt15 Dec 2021


The dirty dozen of Latin America: From Amavaldo to Zumanek

The dirty dozen of Latin America: From Amavaldo to Zumanek

The dirty dozen of Latin America: From Amavaldo to Zumanek

The grand finale of our series dedicated to demystifying Latin American banking trojans

ESET Research15 Dec 2021


5 warning signs your identity has been stolen

5 warning signs your identity has been stolen

5 warning signs your identity has been stolen

By spotting these early warning signs of identity theft, you can minimize the impact on you and your family

Phil Muncaster14 Dec 2021


Log4Shell vulnerability: What we know so far

Log4Shell vulnerability: What we know so far

Log4Shell vulnerability: What we know so far

The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far

Rene Holt13 Dec 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

How 'shoulder surfers' could hack into your Snapchat – Staying safe from gift card fraud – What is a buffer overflow vulnerability?

Editor10 Dec 2021


SnapHack: Watch out for those who can hack into anyone’s Snapchat!

SnapHack: Watch out for those who can hack into anyone’s Snapchat!

SnapHack: Watch out for those who can hack into anyone’s Snapchat!

Oh snap! This is how easy it may be for somebody to hijack your Snapchat account – all they need to do is peer over your shoulder.

Jake Moore09 Dec 2021


5 common gift card scams and how to spot them

5 common gift card scams and how to spot them

5 common gift card scams and how to spot them

It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season

Phil Muncaster07 Dec 2021


What are buffer overflow attacks and how are they thwarted?

What are buffer overflow attacks and how are they thwarted?

What are buffer overflow attacks and how are they thwarted?

Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities

Rene Holt06 Dec 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET researchers analyze malware frameworks targeting air-gapped networks – ESET Research launches a podcast – INTERPOL cracks down on online fraud

Editor03 Dec 2021


Scammers exploit Omicron fears in new COVID-19 phishing campaign

Scammers exploit Omicron fears in new COVID-19 phishing campaign

Scammers exploit Omicron fears in new COVID-19 phishing campaign

Fraudsters take advantage of the emergence of the new variant to dupe unsuspecting victims out of their sensitive data

Amer Owaida03 Dec 2021


Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Press play for the first episode as host Aryeh Goretsky is joined by Zuzana Hromcová to discuss native IIS malware

Roman Kováč02 Dec 2021


Jumping the air gap: 15 years of nation-state effort

Jumping the air gap: 15 years of nation-state effort

Jumping the air gap: 15 years of nation-state effort

ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs

Alexis Dorais-Joncas and Facundo Muñoz01 Dec 2021


Apt Activity Report
MDR Protection