ESET APT Activity Report Q2 2025–Q3 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
20 articles
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
Think you could never fall for an online scam? Think again.
When every minute counts, preparation and precision can mean the difference between disruption and disaster
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecur...
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts
Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.
Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.
Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from ...
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center