Videos


416 articles

Video

Bootkitty marks a new chapter in the evolution of UEFI threats

Bootkitty marks a new chapter in the evolution of UEFI threats

Video

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats

Editor27 Nov 2024


Video

Firefox and Windows zero days chained to deliver the RomCom backdoor

Firefox and Windows zero days chained to deliver the RomCom backdoor

Video

Firefox and Windows zero days chained to deliver the RomCom backdoor

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds

Editor26 Nov 2024


Video

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

Video

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report

Editor14 Nov 2024


Video

Month in security with Tony Anscombe – October 2024 edition

Month in security with Tony Anscombe – October 2024 edition

Video

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories

Editor31 Oct 2024


Video

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

Video

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year

Editor18 Oct 2024


Video, Kids Online

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

Video, Kids Online

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship

Editor16 Oct 2024


Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

GoldenJackal jumps the air gap … twice  – Week in security with Tony Anscombe

Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities

Editor11 Oct 2024


Video

The complexities of attack attribution – Week in security with Tony Anscombe

The complexities of attack attribution – Week in security with Tony Anscombe

Video

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week

Editor04 Oct 2024


Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years

Editor27 Sep 2024