Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to ...
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform ...
IT generalists – and even security managers – wear many hats. Attackers have one job, and they do it round the clock!
Influencers in the crosshairs: How cybercriminals are targeting content creators Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is ...
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots ...
With access to the credentials stored in your password manager, threat actors could hijack your accounts to commit identity ...
Etsy est depuis longtemps une référence pour les créations artisanales uniques et les objets vintage rares. Mais peut-on ...
Un aperçu des activités de certains groupes APT étudiés et analysés par ESET Research au cours des T2 2025 et T3 2025.
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
Air-gapping is used to protect the most sensitive of networks. In the first half of 2020 alone, four previously unknown malicious frameworks designed to breach air-gapped networks emerged, bringing ...
ESET researchers have identified a new threat actor, whom we have named GhostRedirector, that compromised at least 65 Windows servers mainly in Brazil, Thailand, and Vietnam. GhostRedirector used two ...