ESET researchers bring to light unique obfuscation techniques discovered in the course of analyzing a new cryptomining module distributed by the Stantinko group’s botnet
As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks
The warning highlights one of the potential risks associated with revealing too much private information online
As the pandemic forces many employees to work from home, can your organization stay productive – and safe?
From malware-laden emails to fake donations, these are some of the most common cons you should watch out for amid the public health crisis
ESET research into Turla's new campaign – What is CEO fraud and how to defend against it – How Microsoft enterprise accounts get hacked
An unknown number of people had their personal data exposed as hackers accessed database backup files
What is CEO fraud, why is it so prevalent, and how can organizations recognize and defend themselves against these scams?
Does your child dream of becoming a YouTube or Instagram celebrity? The influencer lifestyle is not as picture-perfect as it may seem.
The incident affected our office network, says ENTSO-E, as it implements measures to avoid future cyber-incursions
Can an old APT learn new tricks? Turla’s TTPs are largely unchanged, but the group recently added a Python backdoor.
NordVPN praised its bug bounty program and said that a fix had been shipped within two days
Only 11 percent of all enterprise accounts have multi-factor authentication enabled
ESET research into the Guildma banking trojan – What can you do to stay safe from online fraud – Why become a cybersecurity professional
The misconfigured database was accessed by an unauthorized party on at least one occasion
The fourth installment of our occasional series demystifying Latin American banking trojans
ESET Chief Security Evangelist Tony Anscombe sat down with us to share his insights on how to avoid falling prey to online fraud
With access to text messages and the ability to make fraudulent phone calls, attackers could wreak more damage than you'd think
By contrast, two other web browsers share identifiers that are tied to the device hardware and so persist even across fresh installs
From competitive salaries to ever-evolving job descriptions, there are myriad reasons why a cybersecurity career could be right for you