Two-factor authentication is a simple way to greatly enhance the security of your account
Cryptocurrencies rise and fall, but one thing stays the same – cybercriminals attempt to cash in on the craze
ESET research discovers a previously undocumented UEFI bootkit with roots going back all the way to at least 2012
New ESET Threat Report is out – Cybersecurity Awareness Month begins today – What organizations should do to secure their VPNs
The campaign may last for a month, but we should remember that cybersecurity is a year-round affair
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds
A view of the T2 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks
The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes
ESET unmasks FamousSparrow APT group – Stopping cloud data leaks – European cybercrime ring busted
While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented
Yet another APT group that exploited the ProxyLogon vulnerability in March 2021
Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.
The group used phishing, BEC and other types of attacks to swindle victims out of millions
Analysis of Numando banking trojan, steps to mitigate attack surface, and more! – Week in security with Tony Anscombe
The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.
The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML.
The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks.
Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.
From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims