Latest Articles

Video

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Video

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows

Editor02 Feb 2024


ESET Research

VajraSpy: A Patchwork of espionage apps

VajraSpy: A Patchwork of espionage apps

ESET Research

VajraSpy: A Patchwork of espionage apps

ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group

Lukas Stefanko01 Feb 2024


ESET Research

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes

ESET Research31 Jan 2024


ESET Research

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET Research

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET provided technical analysis, statistical information, known C&C servers and was able to get a glimpse of the victimology

ESET Research30 Jan 2024


Digital Security, Business Security

Cyber: The Swiss army knife of tradecraft

Cyber: The Swiss army knife of tradecraft

Digital Security, Business Security

Cyber: The Swiss army knife of tradecraft

In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike

Andy Garth29 Jan 2024


Video

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

Video

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK

Editor26 Jan 2024


Business Security

Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Business Security

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Phil Muncaster25 Jan 2024


ESET Research

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

ESET Research

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group we have named Blackwood

Facundo Muñoz24 Jan 2024


Scams

Break the fake: The race is on to stop AI voice cloning scams

Break the fake: The race is on to stop AI voice cloning scams

Scams

Break the fake: The race is on to stop AI voice cloning scams

As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’ scam calls – and what the future holds for deepfake detection

Cameron Camp23 Jan 2024


Video

Why many CISOs consider quitting – Week in security with Tony Anscombe

Why many CISOs consider quitting – Week in security with Tony Anscombe

Video

Why many CISOs consider quitting – Week in security with Tony Anscombe

The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings

Editor19 Jan 2024


Scams

Virtual kidnapping: How to see through this terrifying scam

Virtual kidnapping: How to see through this terrifying scam

Scams

Virtual kidnapping: How to see through this terrifying scam

Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims

Phil Muncaster18 Jan 2024


Scams, Digital Security

Is Temu safe? What to know before you ‘shop like a billionaire’

Is Temu safe? What to know before you ‘shop like a billionaire’

Scams, Digital Security

Is Temu safe? What to know before you ‘shop like a billionaire’

Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal

Phil Muncaster17 Jan 2024


Apt Activity Report
MDR Protection