Latest Articles

Cybercrime

The art of digital sleuthing: How digital forensics unlocks the truth

The art of digital sleuthing: How digital forensics unlocks the truth

Cybercrime

The art of digital sleuthing: How digital forensics unlocks the truth

Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell

Lucas Paus and Mario Micucci14 Feb 2024


Digital Security

Deepfakes in the global election year of 2024: A weapon of mass deception?

Deepfakes in the global election year of 2024: A weapon of mass deception?

Digital Security

Deepfakes in the global election year of 2024: A weapon of mass deception?

As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern

Phil Muncaster13 Feb 2024


Video, Ransomware

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Video, Ransomware

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year

Editor09 Feb 2024


Business Security

The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

Business Security

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Phil Muncaster08 Feb 2024


Business Security

Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

Business Security

Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it

Christian Ali Bravo06 Feb 2024


Scams

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

Scams

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

With Valentine’s Day almost upon us, here’s some timely advice on how to prevent scammers from stealing more than your heart

Imogen Byers05 Feb 2024


Video

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Video

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows

Editor02 Feb 2024


ESET Research

VajraSpy: A Patchwork of espionage apps

VajraSpy: A Patchwork of espionage apps

ESET Research

VajraSpy: A Patchwork of espionage apps

ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group

Lukas Stefanko01 Feb 2024


ESET Research

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes

ESET Research31 Jan 2024


ESET Research

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET Research

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET provided technical analysis, statistical information, known C&C servers and was able to get a glimpse of the victimology

ESET Research30 Jan 2024


Digital Security, Business Security

Cyber: The Swiss army knife of tradecraft

Cyber: The Swiss army knife of tradecraft

Digital Security, Business Security

Cyber: The Swiss army knife of tradecraft

In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike

Andy Garth29 Jan 2024


Video

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

Video

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK

Editor26 Jan 2024