News

ESET Research has discovered HybridPetya, a copycat of the infamous Petya/NotPetya malware that adds the capability of ...
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly ...
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to ...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection ...
La découverte de PromptLock révèle comment l’exploitation malveillante de modèles d’IA peut doper l’efficacité des ...
Les infostealers (logiciels de vol de données) alimentent directement l'usurpation d'identité, le détournement de comptes et ...
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS ...
For better or worse, the digital world in many ways resembles its physical counterpart. Unfortunately, that means it sometimes enables, and even exacerbates, the same bad behaviors that we often see ...
UPDATE (September 3 rd, 2025): ESET Research has been contacted by the authors of an academic study, Ransomware 3.0: Self-Composing and LLM-Orchestrated, whose research prototype closely resembles the ...
How long does it take for threat actors to move from initial access to lateral movement? Days? Hours? Unfortunately, the answer for many organizations is increasingly “minutes.” In fact, at 48 minutes ...
As economic uncertainty and persistent inflation are eroding our pay checks and imperilling our pensions, it’s not surprising that many of us are looking to make our money go a bit further.