ESET Research Podcast: Sextortion, digital usury and SQL brute-force Security Closing intrusion vectors force cybercriminals to revisit old attack avenues,… rooter September 13, 2023 1 min read 0
Staying ahead of threats: 5 cybercrime trends to watch Security New reports from Europol and the UK’s National Crime Agency… rooter September 13, 2023 1 min read 0
Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor Security ESET Research uncovers the Sponsoring Access campaign, which utilizes an… rooter September 13, 2023 1 min read 0
Fake Signal and Telegram apps – Week in security with Tony Anscombe Security ESET research uncovers active campaigns targeting Android users and spreading… rooter September 13, 2023 1 min read 0
Getting off the hook: 10 steps to take after clicking on a phishing link Security Phishing emails are a weapon of choice for criminals intent… rooter September 13, 2023 1 min read 0
ESET Research Podcast: Unmasking MoustachedBouncer Security Listen as ESET’s Director of Threat Research Jean-Ian Boutin unravels… rooter September 13, 2023 1 min read 0
How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe Security ESET researchers uncover a Telegram bot that enables even less… rooter September 13, 2023 1 min read 0
BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps Security ESET researchers have discovered active campaigns linked to the China-aligned… rooter September 13, 2023 1 min read 0
What you need to know about iCloud Private Relay Security If you want to try to enter the world of… rooter September 13, 2023 1 min read 0
Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack? Security The campaign started with a trojanized version of unsupported financial… rooter September 13, 2023 1 min read 0