Latest Articles

Shifting the sands of RansomHub’s EDRKillShifter

Shifting the sands of RansomHub’s EDRKillShifter

Shifting the sands of RansomHub’s EDRKillShifter

ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play

Jakub Souček and Jan Holman26 Mar 2025


You will always remember this as the day you finally caught FamousSparrow

You will always remember this as the day you finally caught FamousSparrow

You will always remember this as the day you finally caught FamousSparrow

ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor

Alexandre Côté Cyr26 Mar 2025


Operation FishMedley

Operation FishMedley

Operation FishMedley

ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON

Matthieu Faou20 Mar 2025


MirrorFace updates toolset, expands targeting to Europe

MirrorFace updates toolset, expands targeting to Europe

MirrorFace updates toolset, expands targeting to Europe

The group's Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as a lure

Editor18 Mar 2025


Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor

Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor

Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor

ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor

Dominik Breitenbacher18 Mar 2025


AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)

AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)

AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)

Here's what's been hot on the AI scene over the past 12 months, how it's changing the face of warfare, and how you can fight AI-powered scams

Editor17 Mar 2025


When IT meets OT: Cybersecurity for the physical world

When IT meets OT: Cybersecurity for the physical world

When IT meets OT: Cybersecurity for the physical world

While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat

Phil Muncaster14 Mar 2025


Don’t let cybercriminals steal your Spotify account

Don’t let cybercriminals steal your Spotify account

Don’t let cybercriminals steal your Spotify account

Listen up, this is sure to be music to your ears – a few minutes spent securing your account today can save you a ton of trouble tomorrow

Editor11 Mar 2025


AI-driven deception: A new face of corporate fraud

AI-driven deception: A new face of corporate fraud

AI-driven deception: A new face of corporate fraud

Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses

Phil Muncaster10 Mar 2025


Kids behaving badly online? Here's what parents can do

Kids behaving badly online? Here's what parents can do

Kids behaving badly online? Here's what parents can do

By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable set of life lessons for a new digital age

Phil Muncaster05 Mar 2025


Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights

Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights

Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights

Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution

Editor03 Mar 2025


Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani

Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani

Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani

Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media

ESET Research28 Feb 2025


Apt Activity Report
MDR Protection