Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
March saw a slew of new cybersecurity wake-up calls that showed the need for well-thought-out cyber-resilience plans ...
For many IT and security practitioners, this plays out daily as they scramble to manage what IBM once called a "Frankencloud, ...
In the usual cat-and-mouse game with defenders, the second half of 2024 has seen the cybercriminals keeping busy, finding security loopholes and innovative ways to expand their victim pool. As a ...
Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when many people don’t think twice about ...
Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to ...
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations have ...
Recently, I came across a report detailing “the mother of all breaches” – or to be more exact, the leak of a vast compilation of data that was stolen during a number of attacks on various companies ...
Every day, tens of millions of young people dive into Roblox to build, connect and compete. But with that scale comes opportunity, not just for game designers and players, but also for cybercriminals ...
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
MoustachedBouncer is a cyberespionage group discovered by ESET Research and first publicly disclosed in this blogpost. The group has been active since at least 2014 and only targets foreign embassies ...
Following OceanLotus’ activities is taking a tour in the world of deception. This group is known to lure victims by forging appealing documents to entice potential victims into executing the group’s ...