top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the...
ESET Expert
Jun 17, 2022


Industroyer: A cyber‑weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids...
ESET Expert
Jun 14, 2022


The downside of ‘debugging’ ransomware
The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting...
ESET Expert
May 16, 2022


Crypto malware in patched wallets targeting Android and iOS devices
ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets...
ESET Expert
Mar 25, 2022


CaddyWiper: New wiper malware discovered in Ukraine
This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian...
ESET Expert
Mar 15, 2022


HermeticWiper: New data‑wiping malware hits Ukraine
Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites A number...
ESET Expert
Feb 25, 2022


ESET Research discovers DazzleSpy: macOS malware spying on visitors of Hong Kong pro-democracy news
A watering hole attack compromised a Hong Kong pro-democracy radio station news website. The attackers served a Safari exploit that...
ESET Expert
Jan 25, 2022
Tags
Newsletter
Follow us
Shop our products
bottom of page