Business security


277 articles

Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

TeleBots are back: Supply-chain attacks against Ukraine

TeleBots are back: Supply-chain attacks against Ukraine

Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

TeleBots are back: Supply-chain attacks against Ukraine

This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.

Anton Cherepanov30 Jun 2017


ESET Research, Ransomware

New WannaCryptor-like ransomware attack hits globally: All you need to know

New WannaCryptor-like ransomware attack hits globally: All you need to know

ESET Research, Ransomware

New WannaCryptor-like ransomware attack hits globally: All you need to know

Numerous reports are coming out on social media about a new ransomware attack in Ukraine, which could be related to the Petya family.

Editor27 Jun 2017


Ransomware

WannaCryptor attack ‘may have come from Lazarus group’

WannaCryptor attack ‘may have come from Lazarus group’

Ransomware

WannaCryptor attack ‘may have come from Lazarus group’

Experts in the UK and the US have reportedly claimed that the recent global WannaCryptor ransomware attack was initiated by the North Korean Lazarus Group.

Editor21 Jun 2017


Ukraine Crisis – Digital Security Resource Center

Industroyer: ICS protocols were developed decades ago with no security in mind

Industroyer: ICS protocols were developed decades ago with no security in mind

Ukraine Crisis – Digital Security Resource Center

Industroyer: ICS protocols were developed decades ago with no security in mind

Senior ESET malware researcher Robert Lipovsky discusses Industroyer, the biggest threat to Industrial Control Systems (ICS) since Stuxnet.

Editor19 Jun 2017


Ukraine Crisis – Digital Security Resource Center

Seven years after Stuxnet: Industrial systems security once again in the spotlight

Seven years after Stuxnet: Industrial systems security once again in the spotlight

Ukraine Crisis – Digital Security Resource Center

Seven years after Stuxnet: Industrial systems security once again in the spotlight

Seven years after Stuxnet first came to light, industrial systems security once again in the spotlight, reports ESET's Robert Lipovsky.

Robert Lipovsky16 Jun 2017


ESET Research, Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Industroyer: Biggest threat to industrial control systems since Stuxnet

Industroyer: Biggest threat to industrial control systems since Stuxnet

ESET Research, Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Industroyer: Biggest threat to industrial control systems since Stuxnet

ESET has analyzed a sophisticated and extremely dangerous malware, known as Industroyer, which is designed to disrupt critical industrial processes.

Anton Cherepanov and Robert Lipovsky12 Jun 2017


Ransomware

ESET releases decryptor for AESNI ransomware variants, including XData

ESET releases decryptor for AESNI ransomware variants, including XData

Ransomware

ESET releases decryptor for AESNI ransomware variants, including XData

ESET has released a decryptor for AESNI ransomware variants, including XData. Victims who still have encrypted files can now download it from ESET's utilities page.

Ondrej Kubovič31 May 2017


Ransomware

XData ransomware making rounds amid global WannaCryptor scare

XData ransomware making rounds amid global WannaCryptor scare

Ransomware

XData ransomware making rounds amid global WannaCryptor scare

A week after the global outbreak of WannaCryptor, also known as WannaCry, another ransomware, known as XData, has been making rounds.

Anton Cherepanov23 May 2017


Ransomware

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

Ransomware

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

ESET have prepared a new Crysis decrypting tool. Victims who still have their encrypted files can now download the decryptor from its utilities page.

Ondrej Kubovič22 May 2017