News

The disruption operation, led by Microsoft, aims to seize all known Lumma Stealer C&C domains, rendering Lumma Stealer’s ...
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption ...
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers ...
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation.
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report ...
The bustling enterprise, recently disrupted by a global effort including ESET, is notorious for going after all manner of ...
ESET researchers have discovered a cyberespionage operation that abuses cross-site scripting (XSS) vulnerabilities, including a zero-day XSS flaw in MDaemon webmail software, to steal confidential ...
Globally, data breaches are estimated to cost in excess of $4.2m per incident today. And they’re happening on an unprecedented scale as organizations build out their digital infrastructure ...
The old adage “a chain is only as strong as its weakest link” is regularly repurposed for discussions about cybersecurity. It couldn’t be more apt—except in cyber-arena, each link is ...
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer. How safe and secure is your iPhone really?