ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users ...
Manufacturers operate in one of the most unforgiving threat environments, facing a unique set of pressures that make attacks particularly damaging.
October is Cybersecurity Awareness Month and what better way to open it than with a reminder that the human element is the first and crucial line of defense against all manner of cyberthreats.
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware.
For starters, Roblox executors, even the “reputable” (not malicious) ones, violate Roblox’s Terms of Use. The platform’s anti-cheat safeguards, plus community reporting, keep tabs on suspicious ...
The past 30 days have see no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans.
ESET researchers have discovered a campaign that we attribute to the APT group known as Evasive Panda, where update channels of legitimate applications were mysteriously hijacked to deliver the ...
Why break a door down and set the house alarm off when you have a key and a code to walk in silently? This is the rationale behind a trend in cybersecurity where adversaries are increasingly looking ...
Threat actors are on a roll. They’ve optimized supply chains. Their ranks are growing thanks to pre-packaged services that lower the barriers to entry for budding cybercriminals. And they’re using AI ...
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise ...
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment. Can you tell the difference ...