ESET ExpertJul 21, 2022I see what you did there: A look at the CloudMensis macOS spywarePreviously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from...
ESET ExpertJun 17, 2022How Emotet is changing tactics in response to Microsoft’s tightening of Office macro securityEmotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the...
ESET ExpertJun 14, 2022Industroyer: A cyber‑weapon that brought down a power gridFive years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids...
ESET ExpertMay 16, 2022The downside of ‘debugging’ ransomwareThe decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting...
ESET ExpertMar 25, 2022Crypto malware in patched wallets targeting Android and iOS devicesESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets...
ESET ExpertMar 15, 2022CaddyWiper: New wiper malware discovered in UkraineThis is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian...
ESET ExpertFeb 25, 2022HermeticWiper: New data‑wiping malware hits UkraineHundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites A number...