Latest Articles

ESET Research

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

ESET Research

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor

Peter Kálnai29 Sep 2023


Secure Coding

5 of the top programming languages for cybersecurity

5 of the top programming languages for cybersecurity

Secure Coding

5 of the top programming languages for cybersecurity

While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles

Christian Ali Bravo27 Sep 2023


Secure Coding, Business Security

Can open-source software be secure?

Can open-source software be secure?

Secure Coding, Business Security

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 2023


Video

ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe

ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe

Video

ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe

Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups

Editor22 Sep 2023


ESET Research

Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

ESET Research

Stealth Falcon preying over Middle Eastern skies with Deadglyph

ESET researchers have discovered Deadglyph, a sophisticated backdoor used by the infamous Stealth Falcon group for espionage in the Middle East

ESET Research22 Sep 2023


ESET Research

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET Research

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET researchers document OilRig’s Outer Space and Juicy Mix campaigns, targeting Israeli organizations in 2021 and 2022

Zuzana Hromcová and Adam Burgher21 Sep 2023


We Live Progress

10 tips to ace your cybersecurity job interview

10 tips to ace your cybersecurity job interview

We Live Progress

10 tips to ace your cybersecurity job interview

Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10 tips will put you on the right track.

Phil Muncaster18 Sep 2023


Video

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

Ballistic Bobcat's Sponsor backdoor  – Week in security with Tony Anscombe

Video

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States

Editor14 Sep 2023


Scams

Read it right! How to spot scams on Reddit

Read it right! How to spot scams on Reddit

Scams

Read it right! How to spot scams on Reddit

Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as “the front page of the Internet”?

Roman Cuprik13 Sep 2023


ESET Research

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims

ESET Research12 Sep 2023


ESET Research

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

ESET Research

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

ESET Research uncovers the Sponsoring Access campaign, which utilizes an undocumented Ballistic Bobcat backdoor we have named Sponsor

Adam Burgher11 Sep 2023


Video

Will you give X your biometric data? – Week in security with Tony Anscombe

Will you give X your biometric data? – Week in security with Tony Anscombe

Video

Will you give X your biometric data? – Week in security with Tony Anscombe

The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured

Editor08 Sep 2023