ESET researchers reveal a detailed profile of TA410: we believe this cyberespionage umbrella group consists of…
Category: cybersecurity software
The trouble with BEC: How to stop the costliest internet scam
BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It’s…
Webcam hacking: How to know if someone may be spying on you through your webcam
Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing.…
How can we support young people in harnessing technology for progress?
Young people are not passive victims of technology or helpless addicts. They are technology creators and…
Critical infrastructure: Under cyberattack for longer than you might think
Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to…
Is your Lenovo laptop vulnerable to cyberattack?
Here’s what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what…
When “secure” isn’t secure at all: High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops
ESET researchers discover multiple vulnerabilities in various Lenovo laptop models that allow an attacker with admin…
Innovation and the Roots of Progress
If you look back at the long arc of history, it’s clear that one of the…
ESET takes part in global operation to disrupt Zloader botnets
ESET researchers provided technical analysis, statistical information, and known command and control server domain names and…
Industroyer2: Industroyer reloaded
This ICS-capable malware targets a Ukrainian energy company This is a developing story and the blogpost…