Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of ...
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms.
With cybersecurity talent in short supply and threats evolving fast, MDR is emerging as a strategic necessity for MSPs.
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures ...
Here’s what to know about the malware that tops infostealer charts in 2025 and has an insatiable appetite for valuable data.
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...
Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting ...
ESET researchers have uncovered a mass-spreading phishing campaign, aimed at collecting Zimbra account users’ credentials, active since at least April 2023 and still ongoing. Zimbra Collaboration is ...
Some Minecraft “hacks” don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
As the number of softwarevulnerabilities continues to increase, delaying or skipping security updates could cost your ...
ESET researchers have uncovered two Android spyware campaigns targeting individuals interested in secure communication apps, namely Signal and ToTok. These campaigns distribute malware through ...
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果
反馈