When an online account is compromised, the first few minutes may determine how bad the incident ultimately gets.
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers.
The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026 The cybersecurity implications of the war in the ...
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026 Start using a new app and you’ll often be asked to ...
Le MDR : le monde de la cybersécurité n’a presque plus que cet acronyme à la bouche. Mais de quoi s’agit-il exactement et pourquoi ces services gérés sont-ils autant plébiscités par les entreprises en ...
Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting ...
Strong cybersecurity creates value that may not be immediately obvious or measurable. Here's where to look forit.
Following OceanLotus’ activities is taking a tour in the world of deception. This group is known to lure victims by forging appealing documents to entice potential victims into executing the group’s ...
ESET researchers have analyzed a previously undocumented, real-world UEFI bootkit that persists on the EFI System Partition (ESP). The bootkit, which we’ve named ESPecter, can bypass Windows Driver ...