ESET researchers break down a revamped set of tools that the Sednit group has added to its Zebrocy malware family
Almost 60% of second-hand hard drives hold leftover data from previous owners, a study shows
There is no word on which threat actor is abusing the severe vulnerability for attacks
Many companies are ranking cybersecurity as a top 5 priority but their actions do not measure up to the claim, a survey finds
ESET researchers describe the latest components used in a recent Sednit campaign
A nationwide data leak is believed to affect almost all citizens of Ecuador, putting them at risk of identity theft
The UK’s cybersecurity agency also outlines precautions that academia should take to mitigate risks
In almost all tested units, the researchers achieved their goal of obtaining remote root-level access
The humongous collection of extensive personal details about millions of people could be a gold mine for scam artists
ESET researchers found an undocumented backdoor used by the infamous Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East. With the launch of the Safer Kids online initiative, a guide to help parents protect their kids when they take selfie. The discovery of a serious vulnerability
The bug, which has already been fixed by Facebook, allowed access to private user information that could be abused by malicious actors.
Are you – and especially your children – aware of the risks that may come with sharing selfies?
ESET researchers discovered a backdoor linked to malware used by the Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East
This week, we present an introduction to the MITRE ATT&CK framework, the review of the mobile threats and vulnerabilities detected for mobile during the first half of 2019, and Firefox 69 new features.
Firefox new Enhanced Tracking Protection (ETP) feature launched to all users of the browser to offer better privacy and protection from cryptojacking.
Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported increased.
An introduction to the MITRE ATT&CK framework and how it can help organize and classify various types of threats and adversarial behaviors.
ESET research uncovers the first known instances of spyware that is based on the AhMyth Remote Access Tool and has snuck into Google Play
How schools and educators can address and help prevent abusive behavior on the internet
ESET analysis breaks down the first known spyware that is built on the AhMyth open-source espionage tool and has appeared on Google Play – twice