Admittedly, maintaining constant vigilance in the absence of a visible and acute threat is expensive – psychologically, that ...
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian ...
ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI.
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot ...
Update, 9 October 2018: The remediation section of the white paper contained inaccurate information. Secure Boot doesn't protect against the UEFI rootkit described in this research. We advise that you ...
Typing in a password to access one of the tens or hundreds of services that we use has become such an everyday part of our lives that we rarely give it a second thought. Quite often we try to keep our ...
Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
The burgeoning field of digital forensics plays a crucial role in investigating a wide range of cybercrimes and cybersecurity incidents. Indeed, in our technology-centric world, even investigations of ...
If you’ve been a victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse. Threat actors are using AI to supercharge ...
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot. If you’ve been a victim of fraud, you’re likely already a lead on a ...
In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new malware on the same system, none of ...
Following OceanLotus’ activities is taking a tour in the world of deception. This group is known to lure victims by forging appealing documents to entice potential victims into executing the group’s ...