Latest Articles

ESET Research

To the Moon and back(doors): Lunar landing in diplomatic missions

To the Moon and back(doors): Lunar landing in diplomatic missions

ESET Research

To the Moon and back(doors): Lunar landing in diplomatic missions

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs

Filip Jurčacko15 May 2024


ESET Research

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain

ESET Research

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain

One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft

Marc-Etienne M.Léveillé14 May 2024


ESET Research, Threat Reports

ESET APT Activity Report Q4 2023–Q1 2024

ESET APT Activity Report Q4 2023–Q1 2024

ESET Research, Threat Reports

ESET APT Activity Report Q4 2023–Q1 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024

Jean-Ian Boutin14 May 2024


We Live Science

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe

We Live Science

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe

We spoke to climate scientist Katharine Hayhoe about climate change, faith and psychology – and how to channel anxiety about the state of our planet into meaningful action

Editor10 May 2024


Digital Security

In it to win it! WeLiveSecurity shortlisted for European Cybersecurity Blogger Awards

In it to win it! WeLiveSecurity shortlisted for European Cybersecurity Blogger Awards

Digital Security

In it to win it! WeLiveSecurity shortlisted for European Cybersecurity Blogger Awards

We’re thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates – Best Cybersecurity Vendor Blog category of the European Cybersecurity Blogger Awards 2024

Editor10 May 2024


Video

It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe

It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe

Video

It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe

More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights – including the CISA-led 'Secure by Design' pledge also signed by ESET.

Editor10 May 2024


Digital Security

RSA Conference 2024: AI hype overload

RSA Conference 2024: AI hype overload

Digital Security

RSA Conference 2024: AI hype overload

Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations.

Cameron Camp09 May 2024


We Live Science, Video

Inspiring the next generation of scientists | Unlocked 403 cybersecurity podcast (ep. 3)

Inspiring the next generation of scientists | Unlocked 403 cybersecurity podcast (ep. 3)

We Live Science, Video

Inspiring the next generation of scientists | Unlocked 403 cybersecurity podcast (ep. 3)

As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight

Editor07 May 2024


Digital Security

The hacker’s toolkit: 4 gadgets that could spell security trouble

The hacker’s toolkit: 4 gadgets that could spell security trouble

Digital Security

The hacker’s toolkit: 4 gadgets that could spell security trouble

Their innocuous looks and endearing names mask their true power. These gadgets are designed to help identify and prevent security woes, but what if they fall into the wrong hands?

Daniel Cunha Barbosa06 May 2024


Video

Pay up, or else? – Week in security with Tony Anscombe

Pay up, or else? – Week in security with Tony Anscombe

Video

Pay up, or else? – Week in security with Tony Anscombe

Organizations that fall victim to a ransomware attack are often caught between a rock and a hard place, grappling with the dilemma of whether to pay up or not

Editor03 May 2024


Scams

Adding insult to injury: crypto recovery scams

Adding insult to injury: crypto recovery scams

Scams

Adding insult to injury: crypto recovery scams

Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over

Phil Muncaster02 May 2024


Business Security

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

Business Security

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprise-grade security

Márk Szabó30 Apr 2024


Apt Activity Report
MDR Protection