Latest Articles

ESET Research

ESET Research Podcast: HotPage

ESET Research Podcast: HotPage

ESET Research

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver

ESET Research05 Sep 2024


Business Security

The key considerations for cyber insurance: A pragmatic approach

The key considerations for cyber insurance: A pragmatic approach

Business Security

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options

Tony Anscombe04 Sep 2024


Malware

In plain sight: Malicious ads hiding in search results

In plain sight: Malicious ads hiding in search results

Malware

In plain sight: Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad

Márk Szabó03 Sep 2024


Video

Stealing cash using NFC relay – Week in Security with Tony Anscombe

Stealing cash using NFC relay – Week in Security with Tony Anscombe

Video

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become

Editor28 Aug 2024


ESET Research

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

ESET Research

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

Demystifying CVE-2024-7262 and CVE-2024-7263

Romain Dumont28 Aug 2024


Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

Old devices, new dangers: The risks of unsupported IoT tech

Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors

Márk Szabó27 Aug 2024


Video, Mobile Security

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Video, Mobile Security

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure

Editor26 Aug 2024


Video

PWA phishing on Android and iOS – Week in security with Tony Anscombe

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Video

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security

Editor23 Aug 2024


ESET Research

NGate Android malware relays NFC traffic to steal cash

NGate Android malware relays NFC traffic to steal cash

ESET Research

NGate Android malware relays NFC traffic to steal cash

Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM

Lukas Stefanko and Jakub Osmani22 Aug 2024


Business Security

How regulatory standards and cyber insurance inform each other

How regulatory standards and cyber insurance inform each other

Business Security

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with

Tony Anscombe21 Aug 2024


ESET Research

Be careful what you pwish for – Phishing in PWA applications

Be careful what you pwish for – Phishing in PWA applications

ESET Research

Be careful what you pwish for – Phishing in PWA applications

ESET analysts dissect a novel phishing method tailored to Android and iOS users

Jakub Osmani20 Aug 2024


Video

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Video

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme

Editor16 Aug 2024


Apt Activity Report
MDR Protection