Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Cybercrime
Hackers swipe almost $100 million from major cryptocurrency exchange
Japanese cryptocurrency exchange Liquid suspends cryptocurrency deposits and withdrawals and moves its assets into cold storage
Amer Owaida • 20 Aug 2021
Ransomware, Business Security
Are you, the customer, the one paying the ransomware demand?
Ransomware payments may have greater implications than you thought – and not just for the companies that paid up
Tony Anscombe • 19 Aug 2021
COVID-19
Health authorities in 40 countries targeted by COVID-19 vaccine scammers
Fraudsters impersonate vaccine manufacturers and authorities overseeing vaccine distribution efforts, INTERPOL warns
Amer Owaida • 18 Aug 2021
Digital Security
Nearly 2 million records from terrorist watchlist exposed online
The secret list was exposed online for three weeks, allowing anyone to access it without any kind of authentication
Amer Owaida • 17 Aug 2021
Dumpster diving is a filthy business
One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin
Jake Moore • 17 Aug 2021
Video
Week in security with Tony Anscombe
How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware
Editor • 13 Aug 2021
COVID-19, Business Security
Examining threats to device security in the hybrid workplace
As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
Phil Muncaster • 12 Aug 2021
IISerpent: Malware-driven SEO fraud as a service
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
Zuzana Hromcová • 11 Aug 2021
Scams
Deepfakes – the bot made me do it
As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud?
Tony Anscombe • 10 Aug 2021
Ransomware runs rampant, so how can you combat this threat?
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
Ondrej Kubovič • 10 Aug 2021
DEF CON 29: Satellite hacking 101
How poking at the innards of satellites can make the future of cybersecurity in space more palatable
Cameron Camp • 09 Aug 2021
IISpy: A complex server-side backdoor with anti-forensic features
The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers
Zuzana Hromcová • 09 Aug 2021
5 major US wireless carriers vulnerable to SIM swapping attacks
Kris Jenner reveals naked video could be leaked in iCloud hack
Fuel for thought: Can a driverless car get arrested?
Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
Common LinkedIn scams: Beware of phishing attacks and fake job offers
Sign up for our newsletters