Latest Articles

Common WhatsApp scams and how to avoid them

Common WhatsApp scams and how to avoid them

Common WhatsApp scams and how to avoid them

Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them.

André Lameiras10 Mar 2023


'A woman from Mars' and her journey in space exploration

'A woman from Mars' and her journey in space exploration

'A woman from Mars' and her journey in space exploration

An astrobiologist, analog astronaut, author and speaker, Dr. Michaela Musilova shares her experience as a woman at the forefront of space exploration and from her quest for scientific and personal excellence

Alžbeta Kovaľová08 Mar 2023


Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps – but also exfiltrates sensitive information

Lukas Stefanko07 Mar 2023


What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe

What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe

What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe

A bootkit that ESET researchers have discovered in the wild is the BlackLotus UEFI bootkit that is being peddled on hacking forums

Editor03 Mar 2023


MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol

Alexandre Côté Cyr02 Mar 2023


BlackLotus UEFI bootkit: Myth confirmed

BlackLotus UEFI bootkit: Myth confirmed

BlackLotus UEFI bootkit: Myth confirmed

The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality

Martin Smolár01 Mar 2023


ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022.

ESET Research28 Feb 2023


One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?

Editor24 Feb 2023


A year of wiper attacks in Ukraine

A year of wiper attacks in Ukraine

A year of wiper attacks in Ukraine

ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022

ESET Research24 Feb 2023


WinorDLL64: A backdoor from the vast Lazarus arsenal?

WinorDLL64: A backdoor from the vast Lazarus arsenal?

WinorDLL64: A backdoor from the vast Lazarus arsenal?

The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group

Vladislav Hrčka23 Feb 2023


Writing like a boss: How cybercriminals can use ChatGPT to scam you

Writing like a boss: How cybercriminals can use ChatGPT to scam you

Writing like a boss: How cybercriminals can use ChatGPT to scam you

It’s never been easier to write a convincing message that can trick you into handing over your money or personal data

Phil Muncaster22 Feb 2023


ESET SMB Digital Security Sentiment Report: The damaging effects of a breach

ESET SMB Digital Security Sentiment Report: The damaging effects of a breach

ESET SMB Digital Security Sentiment Report: The damaging effects of a breach

SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached

Editor21 Feb 2023


Apt Activity Report
MDR Protection