ESET researchers provide a comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of ...
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and ...
“Continue with Google” – such a seamless way to sign up for and log into a website or app, especially since you likely are already logged into your Google account. All you need to do is tap or click ...
“A City of a Thousand Zero Days” is the partial title of a talk at Black Hat Europe 2025. I am sure you will appreciate why these few words sparked my interest enough to dedicate time to the ...
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates ...
A brush with online fraud: What are brushing scams and how do I stay safe? Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more ...
Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims Seeking symmetry during ATT&CK® season: How to harness today’s diverse ...
Lorsqu’on évoque la fraude, ses conséquences financières et émotionnelles pour les victimes sont loin d’être exagérées. Ce ...
Air-gapping is used to protect the most sensitive of networks. In the first half of 2020 alone, four previously unknown malicious frameworks designed to breach air-gapped networks emerged, bringing ...