Latest Articles

Under the hood of Wslink’s multilayered virtual machine

Under the hood of Wslink’s multilayered virtual machine

Under the hood of Wslink’s multilayered virtual machine

ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques

Vladislav Hrčka28 Mar 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET discovers Mustang Panda's Hodur trojan – Crypto malware targeting Android and iOS users alike – Nation-state digital deterrent

Editor25 Mar 2022


Is a nation-state digital deterrent scenario so far-fetched?

Is a nation-state digital deterrent scenario so far-fetched?

Is a nation-state digital deterrent scenario so far-fetched?

Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown?

Tony Anscombe24 Mar 2022


Crypto malware in patched wallets targeting Android and iOS devices

Crypto malware in patched wallets targeting Android and iOS devices

Crypto malware in patched wallets targeting Android and iOS devices

ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets

Lukas Stefanko24 Mar 2022


Mustang Panda’s Hodur: Old tricks, new Korplug variant

Mustang Panda’s Hodur: Old tricks, new Korplug variant

Mustang Panda’s Hodur: Old tricks, new Korplug variant

ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine

Alexandre Côté Cyr23 Mar 2022


Sandworm: A tale of disruption told anew

Sandworm: A tale of disruption told anew

Sandworm: A tale of disruption told anew

As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again

Rene Holt21 Mar 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET Research finds another data wiper in Ukraine – Securing data centers against threats – A cultural divide between the military and Silicon Valley

Editor18 Mar 2022


Defending the data center: The time to act is now

Defending the data center: The time to act is now

Defending the data center: The time to act is now

Cyberattacks against data centers may ultimately be everyone's problem – how prepared are their operators for the heightened risk of cyber-assaults?

Phil Muncaster18 Mar 2022


US military vs. Silicon Valley – a cultural divide

US military vs. Silicon Valley – a cultural divide

US military vs. Silicon Valley – a cultural divide

The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture

Cameron Camp16 Mar 2022


CaddyWiper: New wiper malware discovered in Ukraine

CaddyWiper: New wiper malware discovered in Ukraine

CaddyWiper: New wiper malware discovered in Ukraine

This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations

Editor15 Mar 2022


A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

An overview of some of the most popular open-source tools for threat intelligence and threat hunting

Sol González14 Mar 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Gray zone conflicts in cyberspace – Can you identify fake news? – Top cybersecurity threats for the healthcare sector

Editor11 Mar 2022


Apt Activity Report
MDR Protection