Money‑making machine: Monero‑mining malware
While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.
While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.
We are halfway through the year and it is a good opportunity to analyze the extent to which the ideas we gathered in the Trends 2017: Security Held Ransom report have come true.
Lloyd’s of London have reported that a serious cyberattack could cost the global economy as much as a devastating natural disaster.
How do patches work? Could the Microsoft patch have stopped WannaCryptor? All your questions answered.
The latest global cyberattack, detected by ESET as Win32 / Diskcoder.C, considered a variant of Petya, once again highlights the reality outdated systems and insufficient security solutions are still widespread.
This article reveals details about the initial infection vector that was used during the DiskCoder.C outbreak.
This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.
As baby boomers retire and the employment gap in cybersecurity is plugged by generation x, we look at how millennials are set to shape the industry.
Machine learning (ML) in eight blogposts!? In our last post, let’s take a peek under the hood of ESET’s cybersecurity engine and its ML gears.
Multimillion dollar movies and TV shows are increasingly being targeted by cybercriminals. ESET's Stephen Cobb investigates the cyber supply chain risk management problem and explains what to do about it.
Early in 2017, Kevin Townsend invited David Harley and others to comment on vendor hype. Here he expands on his original commentary.
Regardless of how prominent and effective ransomware appears to be, it is not the most dangerous form of malware.
Just weeks after one of the largest global ransomware attacks in history, Infosecurity Europe returns for its 22nd installment.
Businesses are set lose $8 trillion to cybercrime over the course of the next five years, according to a new report.
ESET has released a decryptor for AESNI ransomware variants, including XData. Victims who still have encrypted files can now download it from ESET's utilities page.
Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches in a timely fashion.
ESET's Lysa Myers offers a detailed and comprehensive overview on how to stay safe against ransomware attacks, a threat that is growing in prominence.