Almost a million WordPress websites targeted in massive campaign
An unknown threat actor is exploiting vulnerabilities in plugins for which patches have been available for months, or even years
An unknown threat actor is exploiting vulnerabilities in plugins for which patches have been available for months, or even years
…and why are they selling it to other security vendors and product testers?
Ghost wasn’t the only victim of break-ins over the weekend that exploited critical holes in infrastructure automation software for which patches were available
ESET's new Threat Report is out – Another deep dive into Latin American banking trojans – More coronavirus-themed scams
Scammers rehash old campaigns, create credit card-stealing websites and repurpose information channels to milk the COVID-19 crisis for all it's worth
The email includes the potential victim’s password as evidence of a hack, but there is more than meets the eye
A view of the Q1 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Another in our occasional series demystifying Latin American banking trojans
Microsoft plugs a security hole that could have enabled attackers to weaponize a GIF in order to hijack Teams accounts and steal data
ESET research into vulnerabilities in smart home hubs – Discovering and disrupting a botnet in Latin America – Digital assistants in the work-from-home era
A pair of vulnerabilities in the default email app on iOS devices is believed to have been exploited against high-profile targets
ESET researchers discover, and play a key role in the disruption of, a 35,000-strong botnet spreading in Latin America via compromised USB drives
If you’re trying to be responsible towards the planet, also be responsible to yourself and take these steps so that the device doesn’t end up costing you more than you’ve saved
In worst-case scenarios, some vulnerabilities could even allow attackers to take control over the central units and all peripheral devices connected to them
Security is not a game, but learning about it could be – here’s why adding the fun factor can help employees become more cyber-aware
Being at your beck and call is central to the "personality" of your digital friend, but there are situations when the device could use some time off
Can someone take control of your WhatsApp account by just knowing your phone number? We ran a small test to find out.
Sextortion-meets-coronavirus scams - The financial loss from coronavirus-themed fraud in America - Is the time ripe for one global set of data privacy rules?
Scams demanding bitcoin on pain of infecting you with the coronavirus gain their fair share of shine among schemes with a thin veneer of plausibility
The tool, which comes after a similar effort by Google, looks at how people’s traveling behavior has changed since the start of the pandemic