Latest Articles

Scams

Getting off the hook: 10 steps to take after clicking on a phishing link

Getting off the hook: 10 steps to take after clicking on a phishing link

Scams

Getting off the hook: 10 steps to take after clicking on a phishing link

Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.

Roman Cuprik04 Sep 2023


Video

Fake Signal and Telegram apps – Week in security with Tony Anscombe

Fake Signal and Telegram apps – Week in security with Tony Anscombe

Video

Fake Signal and Telegram apps – Week in security with Tony Anscombe

ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites

Editor31 Aug 2023


Privacy

What you need to know about iCloud Private Relay

What you need to know about iCloud Private Relay

Privacy

What you need to know about iCloud Private Relay

If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend — but is it a true VPN service? The devil is in the details.

Márk Szabó31 Aug 2023


ESET Research

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

ESET Research

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs

Lukas Stefanko30 Aug 2023


Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

The campaign started with a trojanized version of unsupported financial software

Roman Cuprik28 Aug 2023


Video

How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe

How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe

Video

How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe

ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud people out of their money

Editor25 Aug 2023


ESET Research

Telekopye: Hunting Mammoths using Telegram bot

Telekopye: Hunting Mammoths using Telegram bot

ESET Research

Telekopye: Hunting Mammoths using Telegram bot

Analysis of Telegram bot that helps cybercriminals scam people on online marketplaces

Radek Jizba24 Aug 2023


ESET Research

Scarabs colon-izing vulnerable servers

Scarabs colon-izing vulnerable servers

ESET Research

Scarabs colon-izing vulnerable servers

Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle

Jakub Souček22 Aug 2023


Scams

A Bard’s Tale – how fake AI bots try to install malware

A Bard’s Tale – how fake AI bots try to install malware

Scams

A Bard’s Tale – how fake AI bots try to install malware

The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what the hype is about. Heydays for cybercriminals!

Thomas Uhlemann21 Aug 2023


Video

Evacuation of 30,000 hackers – Week in security with Tony Anscombe

Evacuation of 30,000 hackers – Week in security with Tony Anscombe

Video

Evacuation of 30,000 hackers – Week in security with Tony Anscombe

DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event's venue due to a bomb threat

Editor18 Aug 2023


Digital Security, Secure Coding

DEF CON 31: US DoD urges hackers to go and hack ‘AI’

DEF CON 31:  US DoD urges hackers to go and hack ‘AI’

Digital Security, Secure Coding

DEF CON 31: US DoD urges hackers to go and hack ‘AI’

The limits of current AI need to be tested before we can rely on their output

Tony Anscombe18 Aug 2023


ESET Research

Mass-spreading campaign targeting Zimbra users

Mass-spreading campaign targeting Zimbra users

ESET Research

Mass-spreading campaign targeting Zimbra users

ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server.

Viktor Šperka17 Aug 2023