The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
First comes swiping, then comes… scams? Online dating can lead to lasting love, but it can also open the door to heartbreak, fraud, and safety risks. Here’s what to watch out for so you can date smarter and safer.
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Ransomware has long been one of the most feared cyber threats on the internet, and for good reason. It’s fast, disruptive, and increasingly effective at locking up your most important files and demanding payment in exchange for their...
Even when a website looks legitimate, buying medicine online can expose you to scams that might seriously impact your finances, data or even physical health.
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
Avast’s new report spotlights the digital risks facing older generations and how family members can support them with empathy, confidence, and the right tools.
Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
ESET Chief Security Evangelist Tony Anscombe reviews some of the report's standout findings and their implications for organizations in 2025 and beyond
ESET experts discuss Sandworm’s new data wiper, UnsolicitedBooker’s relentless campaigns, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news
In a world where technology keeps us connected, informed, and entertained, it also creates new opportunities for scammers to sneak into our digital lives. From phishing emails to fake websites and AI-generated messages that seem eerily...
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
Cryptocurrency has transformed how we save, spend, and invest money. But with this wave of innovation comes a new breed of scams—slick, high-tech, and harder to spot than ever.
Online threats have become increasingly sophisticated, and phishing attacks are no exception. Among the many tactics cybercriminals deploy, developing phishing campaigns by mimicking well-known companies and duplicating their online...
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
Changing your name—whether due to marriage, divorce, or personal choice—is a significant life event. However, this process involves sharing sensitive personal information across various platforms, making it a potential target for...
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly