The Urdu version of the Hunza News website offers readers the option to download an Android app β little do they know that the app is actually spyware
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk
Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technologyβs business value
Global Diversity Awareness Month is a timely occasion to reflect on the steps required to remove obstacles to women's participation in the security industry and to consider the value of diversity in the security workforce
Cybersecurity Awareness Month draws to a close and Halloween is just around the corner, so here is a bunch of spine-tingling figures about some very real tricks and threats lurking online
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. Whatβs the trade-off?
ESET's analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victimβs machine
One of the biggest threats to watch out for on social media is fraud perpetrated by people who arenβt who they claim to be. Hereβs how to recognize them.
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being
While far from all roles in security explicitly demand coding skills, itβs challenging to envision a career in this field that wouldnβt derive substantial advantages from at least a basic understanding of fundamental coding principles
Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?
Once youβve made it past the initial screening process and secured that all-important interview, itβs time to seal the deal. These 10 tips will put you on the right track.
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States
Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as βthe front page of the Internetβ?
The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured
Phishing emails are a weapon of choice for criminals intent on stealing peopleβs personal data and planting malware on their devices. The healing process does not end with antivirus scanning.
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend β but is it a true VPN service? The devil is in the details.
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs
The AI race is on! Itβs easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what the hype is about. Heydays for cybercriminals!
DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event's venue due to a bomb threat
Unsurprisingly, artificial intelligence took the center stage at this year's edition of Black Hat, one of the world's largest gatherings of cybersecurity professionals
Listen as ESET's Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies in Belarus