ESET research discovers a previously undocumented UEFI bootkit with roots going back all the way to at least 2012
Search results for: "zero trust"
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
Mac users are being urged to update to macOS Big Sur 11.3 as at least one threat group is exploiting the zero-day bug to sneak past the operating system’s built-in security mechanisms
A banking trojan masquerades as Clubhouse for Android – The implications of the Verkada breach – A zero-day patched in Chrome
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
ESET researchers uncover a novel Lazarus supply-chain attack leveraging WIZVERA VeraPort software
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
Brute-force attacks and BlueKeep exploits usurp convenience of direct RDP connections; ESET releases a tool to test your Windows machines for vulnerable versions
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
A bright tomorrow of technical delight, or a dismal future of digital dysfunction?
What are the emotional triggers and errors in judgment that make you fall victim to scammers?
ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe
The adoption of the protocol’s secure variant has continued its growth spurt in recent months, crossing the 50-percent milestone for the first time ever
All good things come to an end, and we’re rounding off our series of interviews to mark the 27th anniversary since computer scientist Tim Berners-Lee publicly announced the World Wide Web project
Our lineup may seem heavy on the defensive side, but such is the nature of game plans for warding off a range of threats lurking in cyberspace
ESET's Senior Security Researcher Stephen Cobb reflects on RSA 2018 and the state of the cybersecurity industry
The new age of technology and legislation brings safety concerns for your personal data
The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel's Core architecture used in PCs for many years, and also affecting ARM processors commonly used in tablets and smartphones.
Over the past few years the Sednit group has used various techniques to deploy their various components on targets computers. The attack usually starts with an email containing either a malicious link or malicious attachment.
To help the reader navigate through the maze of such threats, ESET’s thought leaders have zeroed in on several areas that top the priority list in our exercise in looking forward.