Latest Articles

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware

Editor13 Aug 2021


Examining threats to device security in the hybrid workplace

Examining threats to device security in the hybrid workplace

Examining threats to device security in the hybrid workplace

As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands

Phil Muncaster12 Aug 2021


IISerpent: Malware-driven SEO fraud as a service

IISerpent: Malware-driven SEO fraud as a service

IISerpent: Malware-driven SEO fraud as a service

The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites

Zuzana Hromcová11 Aug 2021


Deepfakes – the bot made me do it

Deepfakes – the bot made me do it

Deepfakes – the bot made me do it

As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud?

Tony Anscombe10 Aug 2021


Ransomware runs rampant, so how can you combat this threat?

Ransomware runs rampant, so how can you combat this threat?

Ransomware runs rampant, so how can you combat this threat?

A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim

Ondrej Kubovič10 Aug 2021


DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

How poking at the innards of satellites can make the future of cybersecurity in space more palatable

Cameron Camp09 Aug 2021


IISpy: A complex server-side backdoor with anti-forensic features

IISpy: A complex server-side backdoor with anti-forensic features

IISpy: A complex server-side backdoor with anti-forensic features

The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers

Zuzana Hromcová09 Aug 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET research dissects IIS web server threats – How IIStealer steals credit card data – The flood of spam in your inbox

Editor06 Aug 2021


Black Hat 2021: Lessons from a lawyer

Black Hat 2021: Lessons from a lawyer

Black Hat 2021: Lessons from a lawyer

Why companies and their security teams need to engage with a lawyer before an incident occurs

Tony Anscombe06 Aug 2021


Black Hat 2021: Wanted posters for ransomware slingers

Black Hat 2021: Wanted posters for ransomware slingers

Black Hat 2021: Wanted posters for ransomware slingers

Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge?

Cameron Camp06 Aug 2021


IIStealer: A server-side threat to e-commerce transactions

IIStealer: A server-side threat to e-commerce transactions

IIStealer: A server-side threat to e-commerce transactions

The first in our series on IIS threats looks at a malicious IIS extension that intercepts server transactions to steal credit card information

Zuzana Hromcová06 Aug 2021


Anatomy of native IIS malware

Anatomy of native IIS malware

Anatomy of native IIS malware

ESET researchers publish a white paper putting IIS web server threats under the microscope

Zuzana Hromcová and Anton Cherepanov06 Aug 2021


Apt Activity Report
MDR Protection