Latest Articles

Threat Reports, ESET Research

ESET APT Activity Report Q4 2022­–Q1 2023

ESET APT Activity Report Q4 2022­–Q1 2023

Threat Reports, ESET Research

ESET APT Activity Report Q4 2022­–Q1 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023

Jean-Ian Boutin09 May 2023


Ukraine Crisis – Digital Security Resource Center, Business Security

How the war in Ukraine has been a catalyst in private-public collaborations

How the war in Ukraine has been a catalyst in private-public collaborations

Ukraine Crisis – Digital Security Resource Center, Business Security

How the war in Ukraine has been a catalyst in private-public collaborations

As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital

André Lameiras09 May 2023


Video

APTs target MSP access to customer networks – Week in security with Tony Anscombe

APTs target MSP access to customer networks – Week in security with Tony Anscombe

Video

APTs target MSP access to customer networks – Week in security with Tony Anscombe

The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers

Editor05 May 2023


Digital Security, Business Security

Creating strong, yet user-friendly passwords: Tips for your business password policy

Creating strong, yet user-friendly passwords: Tips for your business password policy

Digital Security, Business Security

Creating strong, yet user-friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization

Roman Cuprik04 May 2023


Social Media

Using Discord? Don’t play down its privacy and security risks

Using Discord? Don’t play down its privacy and security risks

Social Media

Using Discord? Don’t play down its privacy and security risks

It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut

Márk Szabó03 May 2023


Digital Security

APT groups muddying the waters for MSPs

APT groups muddying the waters for MSPs

Digital Security

APT groups muddying the waters for MSPs

A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers

James Shepperd02 May 2023


Video

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

Video

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated

Editor28 Apr 2023


Digital Security

RSA Conference 2023 – How AI will infiltrate the world

RSA Conference 2023 – How AI will infiltrate the world

Digital Security

RSA Conference 2023 – How AI will infiltrate the world

As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications

Cameron Camp26 Apr 2023


ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software

Facundo Muñoz26 Apr 2023


Video

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

Video

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks

Editor21 Apr 2023


ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

Peter Kálnai and Marc-Etienne M.Léveillé20 Apr 2023


Critical Infrastructure, Business Security

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

Critical Infrastructure, Business Security

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents

Márk Szabó19 Apr 2023