Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures ...
Here’s what to know about the malware that tops infostealer charts in 2025 and has an insatiable appetite for valuable data.
ESET researchers have recently observed a new instance of Operation DreamJob – a campaign that we track under the umbrella of North Korea-aligned Lazarus – in which several European companies active ...
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”.
As ransomware rages on, no organization is too small to be targeted by cyber-extortionists. How can your business protect ...
As the number of softwarevulnerabilities continues to increase, delaying or skipping security updates could cost your ...
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a ...
Some Minecraft “hacks” don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
We have discovered a previously unreported version of Android spyware used by APT-C-23, a threat group also known as Two-tailed Scorpion and mainly targeting the Middle East. ESET products detect the ...
These are nervy times for many business leaders. Persistently high interest rates, geopolitical tensions, supply chain disruption and abrupt changes to trade policies have created a new climate of ...
SnakeStealer: How it preys on personal data – and how you can protect yourself Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's ...