Latest Articles

Digital Security

Your family, home and small business need a cyber-resilience strategy, too!

Your family, home and small business need a cyber-resilience strategy, too!

Digital Security

Your family, home and small business need a cyber-resilience strategy, too!

Your preparedness to deal with cyberattacks is key for lessening the impact of a successful incident – even in home and small business environments

Tony Anscombe09 Oct 2023


Video

DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe

DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe

Video

DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe

The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine

Editor06 Oct 2023


Social Media

Fake friends and followers on social media – and how to spot them

Fake friends and followers on social media – and how to spot them

Social Media

Fake friends and followers on social media – and how to spot them

One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.

Phil Muncaster06 Oct 2023


ESET Research

Operation Jacana: Foundling hobbits in Guyana

Operation Jacana: Foundling hobbits in Guyana

ESET Research

Operation Jacana: Foundling hobbits in Guyana

ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana

Fernando Tavella05 Oct 2023


We Live Progress, Digital Security

Playing your part in building a safer digital world: Why cybersecurity matters

Playing your part in building a safer digital world: Why cybersecurity matters

We Live Progress, Digital Security

Playing your part in building a safer digital world: Why cybersecurity matters

In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being

Phil Muncaster03 Oct 2023


Video

How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Video

How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

Editor29 Sep 2023


ESET Research

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

ESET Research

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor

Peter Kálnai29 Sep 2023


Secure Coding

5 of the top programming languages for cybersecurity

5 of the top programming languages for cybersecurity

Secure Coding

5 of the top programming languages for cybersecurity

While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles

Christian Ali Bravo27 Sep 2023


Secure Coding, Business Security

Can open-source software be secure?

Can open-source software be secure?

Secure Coding, Business Security

Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Aryeh Goretsky and Cameron Camp26 Sep 2023


Video

ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe

ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe

Video

ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe

Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups

Editor22 Sep 2023


ESET Research

Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

ESET Research

Stealth Falcon preying over Middle Eastern skies with Deadglyph

ESET researchers have discovered Deadglyph, a sophisticated backdoor used by the infamous Stealth Falcon group for espionage in the Middle East

ESET Research22 Sep 2023


ESET Research

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET Research

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET researchers document OilRig’s Outer Space and Juicy Mix campaigns, targeting Israeli organizations in 2021 and 2022

Zuzana Hromcová and Adam Burgher21 Sep 2023


Apt Activity Report
MDR Protection