One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?
ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022
The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group
It’s never been easier to write a convincing message that can trick you into handing over your money or personal data
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?
Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites
No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield
ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via malicious websites linked in ads that appear in Google search results
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing
Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly.
Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge?
Your smart speaker is designed to listen, but could it be eavesdropping too?
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
No internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of being plunged into digital darkness.
As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm
As our latest APT Activity Report makes abundantly clear, the threat of cyberespionage and stealthy attacks remains very real
“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online
Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security