As ransomware rages on, no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
Some Minecraft “hacks” don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a ...
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”.
Never rely on just a password, however strong it may be. This October, make it a habit to enable multi-factor authentication ...
As the number of softwarevulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
Smartwatches, fitness trackers, and other wearables are fast becoming almost as familiar to us as our mobile phones and tablets. These connected gadgets do much more than tell the time. They track our ...
Some Minecraft 'hacks' don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod. Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a ...
It’s time to recognize the gravity of cyber risk, put security front and center and, ultimately, turn awareness into action.
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
Following OceanLotus’ activities is taking a tour in the world of deception. This group is known to lure victims by forging appealing documents to entice potential victims into executing the group’s ...
On November 11 th, Google TAG published a blogpost about watering-hole attacks leading to exploits for the Safari web browser running on macOS. ESET researchers had been investigating this campaign ...