The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Twitterβs ditching of free text-message authentication doesnβt mean that you should forgo using 2FA. Instead, switch to another β and, indeed, better β 2FA option.
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via malicious websites linked in ads that appear in Google search results
Donβt torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves β and your entire organization
From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels
Spoiler alert: it turned me down. But thatβs far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly.
A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms
The much-dreaded writerβs block isnβt the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?
ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud
Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies, plus other interesting findings from ESET's new Threat Report
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps β but also exfiltrates sensitive information
Scammers are looking to cash in on the chaos that has set in following the startling meltdowns of Silicon Valley Bank and Signature Bank and the crisis at Credit Suisse
Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.