Latest Articles

Scams

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Scams

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details

Phil Muncaster15 Oct 2024


Digital Security

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

Digital Security

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry

Imogen Byers14 Oct 2024


Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

GoldenJackal jumps the air gap … twice  – Week in security with Tony Anscombe

Video

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities

Editor11 Oct 2024


ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms

Jakub Souček and Radek Jizba10 Oct 2024


Business Security

Cyber insurance, human risk, and the potential for cyber-ratings

Cyber insurance, human risk, and the potential for cyber-ratings

Business Security

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?

Tony Anscombe08 Oct 2024


ESET Research

Mind the (air) gap: GoldenJackal gooses government guardrails

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal

Matías Porolli07 Oct 2024


Video

The complexities of attack attribution – Week in security with Tony Anscombe

The complexities of attack attribution – Week in security with Tony Anscombe

Video

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week

Editor04 Oct 2024


ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia

Romain Dumont02 Oct 2024


Business Security

Why system resilience should mainly be the job of the OS, not just third-party applications

Why system resilience should mainly be the job of the OS, not just third-party applications

Business Security

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience

Tony Anscombe01 Oct 2024


Digital Security

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Digital Security

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices

Tony Anscombe01 Oct 2024


Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years

Editor27 Sep 2024


ESET Research

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine

Zoltán Rusnák26 Sep 2024


Apt Activity Report
MDR Protection