Latest Articles

Privacy

Professional data leakage: How did that security vendor get my personal data?

Professional data leakage: How did that security vendor get my personal data?

Privacy

Professional data leakage: How did that security vendor get my personal data?

…and why are they selling it to other security vendors and product testers?

Righard Zwienenberg05 May 2020


Digital Security

Ghost blogging platform servers hacked to mine cryptocurrency

Ghost blogging platform servers hacked to mine cryptocurrency

Digital Security

Ghost blogging platform servers hacked to mine cryptocurrency

Ghost wasn’t the only victim of break-ins over the weekend that exploited critical holes in infrastructure automation software for which patches were available

Amer Owaida04 May 2020


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET's new Threat Report is out – Another deep dive into Latin American banking trojans – More coronavirus-themed scams

Tomáš Foltýn01 May 2020


COVID-19

It's no time to let your guard down as coronavirus fraud remains a threat

It's no time to let your guard down as coronavirus fraud remains a threat

COVID-19

It's no time to let your guard down as coronavirus fraud remains a threat

Scammers rehash old campaigns, create credit card-stealing websites and repurpose information channels to milk the COVID-19 crisis for all it's worth

Amer Owaida01 May 2020


Scams

Sextortion scammers still shilling with stolen passwords

Sextortion scammers still shilling with stolen passwords

Scams

Sextortion scammers still shilling with stolen passwords

The email includes the potential victim’s password as evidence of a hack, but there is more than meets the eye

Luis Lubeck30 Apr 2020


Threat Reports, ESET Research

ESET Threat Report Q1 2020

ESET Threat Report Q1 2020

Threat Reports, ESET Research

ESET Threat Report Q1 2020

A view of the Q1 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč29 Apr 2020


Grandoreiro: How engorged can an EXE get?

Grandoreiro: How engorged can an EXE get?

Grandoreiro: How engorged can an EXE get?

Another in our occasional series demystifying Latin American banking trojans

ESET Research28 Apr 2020


Digital Security

Microsoft Teams flaw could let attackers hijack accounts

Microsoft Teams flaw could let attackers hijack accounts

Digital Security

Microsoft Teams flaw could let attackers hijack accounts

Microsoft plugs a security hole that could have enabled attackers to weaponize a GIF in order to hijack Teams accounts and steal data

Amer Owaida27 Apr 2020


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET research into vulnerabilities in smart home hubs – Discovering and disrupting a botnet in Latin America – Digital assistants in the work-from-home era

Tomáš Foltýn24 Apr 2020


Digital Security

iOS Mail app flaws may have left iPhone users vulnerable for years

iOS Mail app flaws may have left iPhone users vulnerable for years

Digital Security

iOS Mail app flaws may have left iPhone users vulnerable for years

A pair of vulnerabilities in the default email app on iOS devices is believed to have been exploited against high-profile targets

Amer Owaida23 Apr 2020


ESET Research

Following ESET’s discovery, a Monero mining botnet is disrupted

Following ESET’s discovery, a Monero mining botnet is disrupted

ESET Research

Following ESET’s discovery, a Monero mining botnet is disrupted

ESET researchers discover, and play a key role in the disruption of, a 35,000-strong botnet spreading in Latin America via compromised USB drives

Alan Warburton23 Apr 2020


Digital Security

Buying a secondhand device? Here’s what to keep in mind

Buying a secondhand device? Here’s what to keep in mind

Digital Security

Buying a secondhand device? Here’s what to keep in mind

If you’re trying to be responsible towards the planet, also be responsible to yourself and take these steps so that the device doesn’t end up costing you more than you’ve saved

Amer Owaida22 Apr 2020


Threat Report
MSP Program