The world is changing in front of our eyes. Where facts, truth and honesty were once our most valuable assets, nowadays, alternative-facts, post-truths and outright lies reign. Unfortunately, the cybersecurity industry is no exception to this trend.
White Papers
To get a global view of the Stantinko ecosystem, you need a lot of the pieces of the puzzle. The more we dug and tracked Stantinko, the more we could collect those pieces and put them together.
Win32/Industroyer is a sophisticated piece of malware designed to disrupt the working processes of industrial control systems (ICS).
In this paper, ESET’s Matthieu Faou and Jean-Ian Boutin look at Read The Manual (RTM), a new group that has emerged on the international cybercrime scene. They cover the details of their tools, whom they target, and offer a rare glimpse into the type of operation they are carrying out.
Among other things, this paper delivers a definition of ransomware is provided; ESET’s detection telemetry is used to see the current trends for this cyberthreat; and detail on the most noteworthy Android ransomware examples since 2014 is provided.
Based on “A concise guide to the key provisions of the General Data Protection Regulation (GDPR)” by Kemp Jones Solicitors LLP.
“Our analysis of the current state and evolution of technology reveals one aspect that stands out,” notes ESET Research Laboratories in its annual trends paper. “More and more devices and technologies mean greater challenges when it comes to maintaining information security, regardless of the area of implementation.”
The full whitepaper “En Route with Sednit,” compiling parts 1-3.
In the third and final part of our whitepaper “En Route with Sednit,” we describe a special downloader named Downdelph.
In the second part of our whitepaper “En Route with Sednit”, we focus on Sednit’s espionage toolkit, which is deployed on targets deemed interesting after a reconnaissance phase (described in the first part of the whitepaper).
In the first part of our whitepaper “En Route with Sednit”, we focus on the methods used by the group to attack its targets, and on who these targets are.
As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.
Operation Groundbait (Russian: Прикормка, Prikormka) is an ongoing cyber-surveillance operation targeting individuals in Ukraine. The group behind this operation has been launching targeted and possibly politically-motivated attacks to spy on individuals.
This paper presents ESET’s findings about Operation Groundbait based on our re- search into the Prikormka malware family.
Over the last four decades, the privacy of personal data has been the subject of legislation and litigation in both the US and the EU. Protection of personal data privacy under the law has been shaped by the interests of multiple constituencies: individuals, commercial organizations, government agencies, law enforcement, and national security services.
Ransomware is a growing problem for users of mobile devices. Lock-screen types and fine-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. This report discusses further.
The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers.
“Security is no longer just a problem for a few individuals but rather a problem involving more and more people”, explains ESET Research Laboratories in its annual trends paper. “2016 will be a most challenging year. We must face it with a proactive attitude of security awareness. “
A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.
Windows 10: Should you go there?
How Safe are Australian Children in the Internet Age?