Evasive Panda Cyber Attacks: Threat Actor Targets Tibetans

Cybersecurity experts at ESET have come across a malicious campaign that targets Tibetans in many countries by leveraging the website of a religious gathering. Evasive Panda cyber attacks are associated with a ...

Russian Hackers Target Ukraine Via A Disinformation Campaign

Disinformation campaigns play an important role in cyber warfare, and this is exactly what Russian hackers target Ukraine. After waging war on Ukraine on land, Russia is attacking the East European country ...
3CX Breach Was a Double Supply Chain Compromise

3CX Breach Was a Double Supply Chain Compromise

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk spy novel: North ...
The Link Between AWM Proxy & the Glupteba Botnet

The Link Between AWM Proxy & the Glupteba Botnet

On December 7, 2021, Google announced it had sued two Russian men allegedly responsible for operating the Glupteba botnet, a global malware menace that has infected millions of computers over the past ...
vulnerability ConnectWise

2021 Marred by Aggressive APTs; RDP Attacks up 897%

| | APTs, Coronavirus malware, ESET, RDP
While much of the world tried to regain some semblance of normalcy in 2021 after the onset of the COVID-19 pandemic the year before, cyberattackers were hard at work ushering in the ...
Security Boulevard
SUNBURST Security Applications Chart

Extracting Security Products from SUNBURST DNS Beacons

The latest version of our SunburstDomainDecoder (v1.7) can be used to reveal which endpoint protection applications that are installed on trojanized SolarWinds Orion deployments. The security application info is extracted from DNS ...
brute-force

Remote Work Pushes Brute-Force Attacks Higher

The widespread switch to work-from-home arrangements around the globe means employees are working offsite at unprecedented levels. It’s also prompted cybercriminals to find additional targets to exploit. We have heard for months ...
Security Boulevard
regulatory compliance personality

How Personality Influences Cybersecurity Behavior

In August 2019, ESET and The Myers-Briggs Company released preliminary findings of a fascinating study on the way personality types can influence cybersecurity behaviors. With just a snippet of the data available, ...
Security Boulevard

Antisocial Android Apps

Lukas Stefanko for ESET: Banking Trojans continue to surface on Google Play The malicious apps have all been removed from the official Android store but not before the apps were installed by ...

Android/iOS detections down, but Fortnite flaw problematic

Android/iOS detections down, but Fortnite flaw linked with Man-in-the-Disk ...