Award-winning news, views, and insight from the ESET security community

Latest Articles

ESET Research

Bootkitty: Analyzing the first UEFI bootkit for Linux

Bootkitty: Analyzing the first UEFI bootkit for Linux

ESET Research

Bootkitty: Analyzing the first UEFI bootkit for Linux

ESET researchers analyze the first UEFI bootkit designed for Linux systems

Martin Smolár and Peter Strýček27 Nov 2024


Video

Firefox and Windows zero days chained to deliver the RomCom backdoor

Firefox and Windows zero days chained to deliver the RomCom backdoor

Video

Firefox and Windows zero days chained to deliver the RomCom backdoor

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds

Editor26 Nov 2024


ESET Research

RomCom exploits Firefox and Windows zero days in the wild

RomCom exploits Firefox and Windows zero days in the wild

ESET Research

RomCom exploits Firefox and Windows zero days in the wild

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit

Damien Schaeffer and Romain Dumont26 Nov 2024


ESET Research

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

ESET Research

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, and to Project Wood

Viktor Šperka21 Nov 2024


We Live Science

Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights

Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights

We Live Science

Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights

The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork made Hubble’s success possible

Editor20 Nov 2024


Digital Security

My information was stolen. Now what?

My information was stolen. Now what?

Digital Security

My information was stolen. Now what?

The slow and painful recovery process

Aryeh Goretsky19 Nov 2024


Scams

What is “Scam Likely”? Putting the phone down on unwanted calls

What is “Scam Likely”? Putting the phone down on unwanted calls

Scams

What is “Scam Likely”? Putting the phone down on unwanted calls

Tired of dodging all those 'Scam Likely' calls? Here's what’s behind the label and how to stay one step ahead of phone scammers.

Phil Muncaster18 Nov 2024


Video

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

Video

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report

Editor14 Nov 2024


ESET Research

ESET Research Podcast: Gamaredon

ESET Research Podcast: Gamaredon

ESET Research

ESET Research Podcast: Gamaredon

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation

ESET Research13 Nov 2024


We Live Progress

Beats by bot: The AI remix revolution

Beats by bot: The AI remix revolution

We Live Progress

Beats by bot: The AI remix revolution

Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of music

Imogen Byers12 Nov 2024


Business Security

Beyond the checkbox: Demystifying cybersecurity compliance

Beyond the checkbox: Demystifying cybersecurity compliance

Business Security

Beyond the checkbox: Demystifying cybersecurity compliance

In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business

Márk Szabó11 Nov 2024


ESET Research

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

ESET Research

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules

Alexandre Côté Cyr08 Nov 2024


Apt Activity Report
MDR Protection