From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
Cybercriminals have tricked Xβs AI chatbot into promoting phishing scams in a technique that has been nicknamed βGrokkingβ. Hereβs what to know about it.
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
As the attack surface expands and the threat landscape grows more complex, itβs time to consider whether your data protection strategy is fit for purpose
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
Threat actors are embracing ClickFix, ransomware gangs are turning on each other β toppling even the leaders β and law enforcement is disrupting one infostealer after another
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
ESET Research analyzes Gamaredonβs updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
ESET experts discuss Sandwormβs new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
Hereβs a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly