ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users ...
Manufacturers operate in one of the most unforgiving threat environments, facing a unique set of pressures that make attacks particularly damaging.
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware.
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals.
The past 30 days have see no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans.
For starters, Roblox executors, even the “reputable” (not malicious) ones, violate Roblox’s Terms of Use. The platform’s anti-cheat safeguards, plus community reporting, keep tabs on suspicious ...
Why break a door down and set the house alarm off when you have a key and a code to walk in silently? This is the rationale behind a trend in cybersecurity where adversaries are increasingly looking ...
ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising UEFI-based systems ...
Les “Digital Natives” (ou natifs/enfants du numérique) sont à l'aise avec la technologie, mais seraient davantage exposés aux arnaques en ligne et autres menaces. En tout cas, bien plus qu'ils ne le p ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results