Latest Articles

Deepfakes in the global election year of 2024: A weapon of mass deception?

Deepfakes in the global election year of 2024: A weapon of mass deception?

Deepfakes in the global election year of 2024: A weapon of mass deception?

As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern

Phil Muncaster13 Feb 2024


Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year

Editor09 Feb 2024


The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Phil Muncaster08 Feb 2024


Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it

Tomáš Foltýn06 Feb 2024


Could your Valentine be a scammer? How to avoid getting caught in a bad romance

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

With Valentine’s Day almost upon us, here’s some timely advice on how to prevent scammers from stealing more than your heart

Imogen Byers05 Feb 2024


Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows

Editor02 Feb 2024


VajraSpy: A Patchwork of espionage apps

VajraSpy: A Patchwork of espionage apps

VajraSpy: A Patchwork of espionage apps

ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group

Lukas Stefanko01 Feb 2024


ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes

ESET Research31 Jan 2024


ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET provided technical analysis, statistical information, known C&C servers and was able to get a glimpse of the victimology

ESET Research30 Jan 2024


Cyber: The Swiss army knife of tradecraft

Cyber: The Swiss army knife of tradecraft

Cyber: The Swiss army knife of tradecraft

In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike

Andy Garth29 Jan 2024


Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK

Editor26 Jan 2024


Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Phil Muncaster25 Jan 2024


Apt Activity Report
MDR Protection