This week, ESET researchers released their findings about Operation In(ter)ception, a campaign that leveraged LinkedIn-based spearphishing and took aim at aerospace and military companies in Europe and the Middle East between September and December 2019. Another major research effort by ESET experts revealed a campaign by the InvisiMole group that targeted high-profile organizations in the military sector and diplomatic missions in Eastern Europe in late 2019 and involved collaboration with Gamaredon, a fellow APT gang. No fewer than 19 vulnerabilities, collectively dubbed Ripple20, in the TCP/IP software library open countless IoT devices to attacks. All this – and more – on WeLiveSecurity.com.