Here’s what to know about the malware that tops infostealer charts in 2025 and has an insatiable appetite for valuable data.
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a ...
As ransomware rages on, no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
Some Minecraft “hacks” don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”.
As the number of softwarevulnerabilities continues to increase, delaying or skipping security updates could cost your ...
IT security is often regarded as the “Department of No” and sometimes it’s easy to see why. In a world of escalating cyber-risk, expanding attack surfaces and a fast-growing cybercrime economy, ...
Following OceanLotus’ activities is taking a tour in the world of deception. This group is known to lure victims by forging appealing documents to entice potential victims into executing the group’s ...
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous ...
On November 11 th, Google TAG published a blogpost about watering-hole attacks leading to exploits for the Safari web browser running on macOS. ESET researchers had been investigating this campaign ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results