top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


A Bard’s Tale – how fake AI bots try to install malware
The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what...
ESET Expert
Aug 28, 2023


I see what you did there: A look at the CloudMensis macOS spyware
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from...
ESET Expert
Jul 21, 2022


How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the...
ESET Expert
Jun 17, 2022


Industroyer: A cyber‑weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids...
ESET Expert
Jun 14, 2022


The downside of ‘debugging’ ransomware
The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting...
ESET Expert
May 16, 2022


Crypto malware in patched wallets targeting Android and iOS devices
ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets...
ESET Expert
Mar 25, 2022


CaddyWiper: New wiper malware discovered in Ukraine
This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian...
ESET Expert
Mar 15, 2022


HermeticWiper: New data‑wiping malware hits Ukraine
Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites A number...
ESET Expert
Feb 25, 2022
Tags
Newsletter
Follow us
Shop our products
bottom of page