Latest Articles

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities

Editor09 Jun 2023


Asylum Ambuscade: crimeware or cyberespionage?

Asylum Ambuscade: crimeware or cyberespionage?

Asylum Ambuscade: crimeware or cyberespionage?

A curious case of a threat actor at the border between crimeware and cyberespionage

Matthieu Faou08 Jun 2023


Hear no evil: Ultrasound attacks on voice assistants

Hear no evil: Ultrasound attacks on voice assistants

Hear no evil: Ultrasound attacks on voice assistants

How your voice assistant could do the bidding of a hacker – without you ever hearing a thing

Márk Szabó07 Jun 2023


7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future

Roman Cuprik06 Jun 2023


API security in the spotlight – Week in security with Tony Anscombe

API security in the spotlight – Week in security with Tony Anscombe

API security in the spotlight – Week in security with Tony Anscombe

Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.

Editor02 Jun 2023


All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency

Phil Muncaster01 Jun 2023


5 free OSINT tools for social media

5 free OSINT tools for social media

5 free OSINT tools for social media

A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms

Martina López31 May 2023


Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys

Roman Cuprik30 May 2023


How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool

Editor26 May 2023


Shedding light on AceCryptor and its operation

Shedding light on AceCryptor and its operation

Shedding light on AceCryptor and its operation

ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families

Jakub Kaloč25 May 2023


Digital security for the self-employed: Staying safe without an IT team to help

Digital security for the self-employed: Staying safe without an IT team to help

Digital security for the self-employed: Staying safe without an IT team to help

Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business

Phil Muncaster24 May 2023


Android app breaking bad: From legitimate screen recording to file exfiltration within a year

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio

Lukas Stefanko23 May 2023


Threat Report
MSP Program