MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a ...
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting ...
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to ...
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform ...
As economic uncertainty and persistent inflation are eroding our pay checks and imperilling our pensions, it’s not surprising that many of us are looking to make our money go a bit further.
ESET researchers discovered two previously unknown backdoors – which we named LunarWeb and LunarMail – compromising a European ministry of foreign affairs (MFA) and its diplomatic missions abroad. We ...
ESET researchers discovered a still-ongoing campaign using a previously undocumented Korplug variant, which they named Hodur due to its resemblance to the THOR variant previously documented by Unit 42 ...
ESET researchers have identified an updated version of Android GravityRAT spyware being distributed as the messaging apps BingeChat and Chatico. GravityRAT is a remote access tool known to be used ...
Air-gapping is used to protect the most sensitive of networks. In the first half of 2020 alone, four previously unknown malicious frameworks designed to breach air-gapped networks emerged, bringing ...
IT generalists – and even security managers – wear many hats. Attackers have one job, and they do it round the clock!
Shadow IT has long been a thorn in the side of corporate security teams. After all, you can’t manage or protect what you can’t see. But things could be about to get a lot worse. The scale, reach and ...
For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In the midst of routine monitoring of suspicious activities on the systems of ...