Latest Articles

ESET Research

ESET Research Podcast: EvilVideo

ESET Research Podcast: EvilVideo

ESET Research

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos

ESET Research17 Sep 2024


Digital Security

AI security bubble already springing leaks

AI security bubble already springing leaks

Digital Security

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one

Cameron Camp16 Sep 2024


Video, Ransomware

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

Video, Ransomware

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends

Editor13 Sep 2024


Scams

6 common Geek Squad scams and how to defend against them

6 common Geek Squad scams and how to defend against them

Scams

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks

Phil Muncaster11 Sep 2024


ESET Research

CosmicBeetle steps up: Probation period at RansomHub

CosmicBeetle steps up: Probation period at RansomHub

ESET Research

CosmicBeetle steps up: Probation period at RansomHub

CosmicBeetle, after improving its own ransomware, tries its luck as a RansomHub affiliate

Jakub Souček10 Sep 2024


Video

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

Video

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams

Editor06 Sep 2024


ESET Research

ESET Research Podcast: HotPage

ESET Research Podcast: HotPage

ESET Research

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver

ESET Research05 Sep 2024


Business Security

The key considerations for cyber insurance: A pragmatic approach

The key considerations for cyber insurance: A pragmatic approach

Business Security

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options

Tony Anscombe04 Sep 2024


Malware

In plain sight: Malicious ads hiding in search results

In plain sight: Malicious ads hiding in search results

Malware

In plain sight: Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad

Márk Szabó03 Sep 2024


Video

Stealing cash using NFC relay – Week in Security with Tony Anscombe

Stealing cash using NFC relay – Week in Security with Tony Anscombe

Video

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become

Editor28 Aug 2024


ESET Research

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

ESET Research

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

Demystifying CVE-2024-7262 and CVE-2024-7263

Romain Dumont28 Aug 2024


Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

Old devices, new dangers: The risks of unsupported IoT tech

Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors

Márk Szabó27 Aug 2024


Apt Activity Report
MDR Protection