Beware of threats lurking in booby-trapped PDF files
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.
20 articles
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
You could be getting more than you bargained for when you download that cheat tool promising quick wins
Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecur...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google ...
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortag...
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online...