Critical infrastructure


50 articles

Industroyer2: Industroyer reloaded

Industroyer2: Industroyer reloaded

Industroyer2: Industroyer reloaded

This ICS-capable malware targets a Ukrainian energy company

ESET Research12 Apr 2022


Europe's quest for energy independence – and how cyber-risks come into play

Europe's quest for energy independence – and how cyber-risks come into play

Europe's quest for energy independence – and how cyber-risks come into play

Soaring energy prices and increased geopolitical tensions amid the Russian invasion of Ukraine bring a sharp focus on European energy security

André Lameiras and James Shepperd29 Mar 2022


Sandworm: A tale of disruption told anew

Sandworm: A tale of disruption told anew

Sandworm: A tale of disruption told anew

As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again

Rene Holt21 Mar 2022


Securing healthcare: An IT health check on the state of the sector

Securing healthcare: An IT health check on the state of the sector

Securing healthcare: An IT health check on the state of the sector

No sector or organization is immune to rapidly escalating threats, but when it comes to healthcare, the stakes couldn’t be higher

Phil Muncaster09 Mar 2022


Cyber-readiness in the face of an escalated gray zone conflict

Cyber-readiness in the face of an escalated gray zone conflict

Cyber-readiness in the face of an escalated gray zone conflict

Organizations worldwide should remain on high alert for cyberattacks as the risk of major cyber-spillover from the crisis in Ukraine continues to loom large

Andrew Lee07 Mar 2022


Emergency preparedness: How to disaster-proof your tech

Emergency preparedness: How to disaster-proof your tech

Emergency preparedness: How to disaster-proof your tech

Here are a few tips that will help you get your ‘go bag’ ready if you have to leave at a moment’s notice and need your communications and data to survive

Cameron Camp04 Mar 2022


ESET Research Podcast: Ukraine’s past and present cyberwar

ESET Research Podcast: Ukraine’s past and present cyberwar

ESET Research Podcast: Ukraine’s past and present cyberwar

Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country

ESET Research03 Mar 2022


FBI, CISA urge organizations to be on guard for attacks during holidays

FBI, CISA urge organizations to be on guard for attacks during holidays

FBI, CISA urge organizations to be on guard for attacks during holidays

Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends

Amer Owaida23 Nov 2021


Choosing your MSP: What the Kaseya incident tells us about third-party cyber-risk

Choosing your MSP: What the Kaseya incident tells us about third-party cyber-risk

Choosing your MSP: What the Kaseya incident tells us about third-party cyber-risk

Lessons to learn from the Kaseya cyberincident to protect your business' data when doing business with a MSP.

Phil Muncaster13 Jul 2021