Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts
ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services
Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world
Not long ago, the ability to remotely track someoneβs daily movements just by knowing their home address, employer, or place of worship was considered a powerful surveillance tool that should only be in the purview of nation states. But a new lawsuit in a likely constitutional battle over a New Jersey privacy law shows that anyone can now access this capability, thanks to a proliferation of commercial services that...
Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit
Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers
Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being "USDoD," a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI's InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a...
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan (a.k.a. AnonSudan), a cybercrime business known for launching powerful distributed denial-of-service (DDoS) attacks against a range of targets, including dozens of hospitals, news websites and cloud providers. One of the brothers is facing life in prison for allegedly seeking to kill people...
βHey, wanna chat?β This innocent phrase can take on a sinister meaning when it comes from an adult to a child online β and even be the start of a predatory relationship
Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal driversβ payment details
The world needs more cybersecurity professionals β here are three great ways to give you an βinβ to the ever-growing and rewarding security industry
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities
ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms
The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August were carjacked a week later, while out house-hunting in a brand new Lamborghini. Prosecutors say the couple was beaten and briefly kidnapped by six young men who traveled from Florida as part of a botched plan to hold the parents for ransom.
Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple has addressed a bug in its new macOS 15 "Sequoia" update that broke many cybersecurity tools.
Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess peopleβs financial responsibility?
ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal
Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week
ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia
Building efficient recovery options will drive ecosystem resilience
Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices
ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years
ESET Research has conducted a comprehensive technical analysis of Gamaredonβs toolset used to conduct its cyberespionage activities focused in Ukraine
Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudstersβ scare tactics
Hereβs what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app
With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process
How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help
ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos
Artificial intelligence is just a spoke in the wheel of security β an important spoke but, alas, only one
ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends
Learn about the main tactics used by scammers impersonating Best Buyβs tech support arm and how to avoid falling for their tricks
CosmicBeetle, after improving its own ransomware, tries its luck as a RansomHub affiliate
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams