IT generalists – and even security managers – wear many hats. Attackers have one job, and they do it round the clock!
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform ...
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company.
The OSINT playbook: Find your weak spots before attackers do Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect ...
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots ...
With access to the credentials stored in your password manager, threat actors could hijack your accounts to commit identity ...
Etsy est depuis longtemps une référence pour les créations artisanales uniques et les objets vintage rares. Mais peut-on ...
Un aperçu des activités de certains groupes APT étudiés et analysés par ESET Research au cours des T2 2025 et T3 2025.
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report.
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
ESET researchers discovered a still-ongoing campaign using a previously undocumented Korplug variant, which they named Hodur due to its resemblance to the THOR variant previously documented by Unit 42 ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results