News
The bustling enterprise, recently disrupted by a global effort including ESET, is notorious for going after all manner of sensitive data, including passwords, credit card numbers, and cryptowallet ...
The disruption operation, led by Microsoft, aims to seize all known Lumma Stealer C&C domains, rendering Lumma Stealer’s ...
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate ...
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers ...
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation, one of the most ...
Operation RoundPress exploits security holes in webmail software to target Ukrainian governmental entities and defense ...
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report ...
This blogpost introduces an operation that we named RoundPress, targeting high-value webmail servers with XSS vulnerabilities, and that we assess with medium confidence is run by the Sednit ...
Chances are high that many people think, “it’s an iPhone, so I’m safe”. Apple’s control over its device and app ecosystem has indeed historically been tight, with its walled-garden ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results