Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
ESET researchers lure GMERA malware operators to remotely control their Mac honeypots
ESET research uncovers a malicious operation that both spies on victims and leaks their data
ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in the fintech sector
Poorly secured remote access attracts mostly ransomware gangs, but can provide access to coin miners and backdoors too
ESET researchers dissect an Android app that masquerades as an official COVID-19 contact-tracing app and encrypts files on the victim's device
ESET researchers reveal the modus operandi of the elusive InvisiMole group, including newly discovered ties with the Gamaredon group
ESET researchers uncover targeted attacks against high-profile aerospace and military companies
Active APT group adds cunning remote template injectors for Word and Excel documents; unique Outlook mass-mailing macro
Turla has updated its ComRAT backdoor and now uses the Gmail web interface for Command and Control
ESET researchers detect a new way of misusing Accessibility Service, the Achilles’ heel of Android security
The notorious APT group continues to play the video game industry with yet another backdoor
ESET researchers dissect a backdoor deployed in attacks against multiple government agencies and major organizations operating in two critical infrastructure sectors in Asia
ESET researchers uncover several instances of malware that uses various attack vectors to target systems isolated by an air gap
A view of the Q1 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Another in our occasional series demystifying Latin American banking trojans
ESET researchers discover, and play a key role in the disruption of, a 35,000-strong botnet spreading in Latin America via compromised USB drives
In worst-case scenarios, some vulnerabilities could even allow attackers to take control over the central units and all peripheral devices connected to them
ESET researchers bring to light unique obfuscation techniques discovered in the course of analyzing a new cryptomining module distributed by the Stantinko group’s botnet