ESET researchers reveal how the notorious APT group Turla collaborates with fellow FSB-associated group known as Gamaredon to ...
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large ...
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware.
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality.
For starters, Roblox executors, even the “reputable” (not malicious) ones, violate Roblox’s Terms of Use. The platform’s anti-cheat safeguards, plus community reporting, keep tabs on suspicious ...
Why break a door down and set the house alarm off when you have a key and a code to walk in silently? This is the rationale behind a trend in cybersecurity where adversaries are increasingly looking ...
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024 ...
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy Under lock and key: ...
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment. Can you tell the difference ...
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises ...
Most reverse engineers would agree that quite often one can learn something new on the job. However, it is not every day you learn how to cook a delicious meal while analyzing malware. This unique ...
In this blogpost, ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by the China-aligned threat actor that we have named ...