ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
Threat actors are embracing ClickFix, ransomware gangs are turning on each other β toppling even the leaders β and law enforcement is disrupting one infostealer after another
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
ESET Research analyzes Gamaredonβs updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
ESET experts discuss Sandwormβs new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
Hereβs a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly
When we get the call, itβs our legal responsibility to attend jury service. But sometimes that call wonβt come from the courts β it will be a scammer.
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
Corporate data breaches are a gateway to identity fraud, but theyβre not the only one. Hereβs a lowdown on how your personal data could be stolen β and how to make sure it isnβt.
Security awareness training doesnβt have to be a snoozefest β games and stories can help instill βstickyβ habits that will kick in when a danger is near
ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the groupβs signature backdoor, SparrowDoor
ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor
While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure canβt afford to dismiss the OT threat
With AI's pattern recognition capabilities well-established, Mr. SchΓΆlkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?
The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times
One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.
Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.