Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-06-09 12:00:38 |
Gelsemium: When threat actors go gardening (lien direct) |
ESET researchers shed light on new campaigns from the quiet Gelsemium group
|
Threat
|
|
|
|
2021-06-03 09:30:11 |
ESET Threat Report T1 2021 (lien direct) |
A view of the T1 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2021-05-17 13:00:23 |
Take action now – FluBot malware may be on its way (lien direct) |
Why FluBot is a major threat for Android users, how to avoid falling victim, and how to get rid of the malware if your device has already been compromised
|
Threat
Malware
|
|
|
|
2021-04-27 16:37:41 |
Apple patches severe macOS security flaw (lien direct) |
Mac users are being urged to update to macOS Big Sur 11.3 as at least one threat group is exploiting the zero-day bug to sneak past the operating system's built-in security mechanisms
|
Threat
|
|
|
|
2021-04-06 09:30:27 |
Janeleiro, the time traveler: A new old banking trojan in Brazil (lien direct) |
ESET Research uncovers a new threat that targets organizations operating in various sectors in Brazil
|
Threat
|
|
|
|
2021-03-22 10:30:38 |
5 reasons why (not only) financial companies struggle with cybersecurity (lien direct) |
Why do many organizations have a hard time keeping up with the evolving threat landscape and effectively managing their cyber-risks?
|
Threat
|
|
|
|
2021-02-08 10:30:47 |
(Déjà vu) ESET Threat Report Q4 2020 (lien direct) |
A view of the Q4 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2021-02-02 10:30:02 |
Kobalos – A complex Linux threat to high performance computing infrastructure (lien direct) |
ESET researchers publish a white paper about unique multiplatform malware they've named Kobalos
|
Threat
Malware
|
|
|
|
2020-12-01 18:49:31 |
Cyberattackers could trick scientists into producing dangerous substances (lien direct) |
Without ever setting foot in the lab, a threat actor could dupe DNA researchers into creating pathogens, according to a study describing "an end-to-end cyber-biological attack"
|
Threat
|
|
|
|
2020-11-26 16:45:13 |
FBI warns of threat actors spoofing Bureau domains, email accounts (lien direct) |
The U.S. law enforcement agency shares a sampling of more than 90 spoofed FBI-related domains registered recently
|
Threat
|
|
|
|
2020-10-28 13:00:57 |
(Déjà vu) ESET Threat Report Q3 2020 (lien direct) |
A view of the Q3 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2020-09-30 09:30:42 |
APT‑C‑23 group evolves its Android spyware (lien direct) |
ESET researchers uncover a new version of Android spyware used by the APT-C-23 threat group against targets in the Middle East
|
Threat
|
APT-C-23
|
|
|
2020-09-02 13:27:44 |
Norway\'s parliament struck by hackers (lien direct) |
Unknown threat actors were able to exfiltrate information from the email accounts of several parliamentarians
|
Threat
|
|
|
|
2020-08-07 12:00:43 |
Stadeo: Deobfuscating Stantinko and more (lien direct) |
We introduce Stadeo – a set of scripts that can help fellow threat researchers and reverse engineers to deobfuscate the code of Stantinko and other malware
|
Threat
|
|
|
|
2020-07-29 09:30:47 |
(Déjà vu) ESET Threat Report Q2 2020 (lien direct) |
A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2020-07-28 15:34:22 |
FBI warns of disruptive DDoS amplification attacks (lien direct) |
The Bureau expects cybercriminals to increasingly abuse new threat vectors for large-scale DDoS attacks
|
Threat
|
|
|
|
2020-07-15 09:30:34 |
Mobile security threats amid COVID‑19 and beyond: A Q&A with Lukas Stefanko (lien direct) |
ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context
|
Threat
Ransomware
Malware
|
|
|
|
2020-05-12 12:30:02 |
WannaCryptor remains a global threat three years on (lien direct) |
WannaCryptor is still alive and kicking, so much so that it sits atop the list of the most commonly detected ransomware families
|
Threat
Ransomware
|
Wannacry
|
|
|
2020-05-06 19:18:12 |
Almost a million WordPress websites targeted in massive campaign (lien direct) |
An unknown threat actor is exploiting vulnerabilities in plugins for which patches have been available for months, or even years
|
Threat
|
|
|
|
2020-05-01 09:30:34 |
It\'s no time to let your guard down as coronavirus fraud remains a threat (lien direct) |
Scammers rehash old campaigns, create credit card-stealing websites and repurpose information channels to milk the COVID-19 crisis for all it's worth
|
Threat
|
|
|
|
2020-04-29 12:00:04 |
ESET Threat Report (lien direct) |
A view of the Q1 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2020-02-19 10:30:19 |
What DNS encryption means for enterprise threat hunters (lien direct) |
The dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge
|
Threat
|
|
|
|
2019-10-29 10:30:55 |
What you may be getting wrong about cybersecurity (lien direct) |
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
|
Threat
|
|
|
|
2019-09-25 13:50:46 |
Microsoft rushes out patch for Internet Explorer zero‑day (lien direct) |
There is no word on which threat actor is abusing the severe vulnerability for attacks
|
Threat
Vulnerability
|
|
|
|
2019-08-20 15:25:00 |
Ransomware wave hits 23 towns in Texas (lien direct) |
>The attack, which has victimized mostly smaller local governments, is thought to have been unleashed by a single threat actor
|
Threat
Ransomware
|
|
|
|
2019-02-22 14:34:05 |
Cyber-extortionists take aim at lucrative targets (lien direct) |
A new report shines some light on multiple aspects of the growing threat of cyber-extortion
|
Threat
|
|
|
|
2019-01-24 16:57:02 |
Cybersecurity Barometer: Cybercrime\'s impact on privacy and security (lien direct) |
>Study shows the majority of Americans fear the misuse of their personal data supplied to websites, and view cybercrime as a threat to their country
|
Threat
|
|
|
|
2019-01-03 14:58:05 |
What is threat cumulativity and what does it mean for digital security? (lien direct) |
>A reflection on how acknowledging the cumulative nature of cyber-threats and understanding its implications can benefit our digital security
|
Threat
|
|
|
|
2018-12-14 10:58:03 |
How to protect yourself as the threat of scam apps grows (lien direct) |
>As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?
|
Threat
|
|
|
|
2018-11-09 14:11:00 |
Emotet launches major new spam campaign (lien direct) |
The recent spike in Emotet activity shows that it remains an active threat
|
Threat
Spam
|
|
|
|
2018-10-31 12:47:05 |
Growing pains: Skills gap meets expanding threat surface (lien direct) |
The need to defend a growing threat surface highlights the widening cybersecurity skills gap
|
Threat
|
|
|
|
2018-10-29 12:58:04 |
Ransomware and the enterprise: A new white paper (lien direct) |
>Ransomware remains a serious threat and this new white paper explains what enterprises need to know, and do, to reduce risk
|
Threat
Ransomware
|
|
|
|
2018-10-17 09:55:03 |
GreyEnergy: Updated arsenal of one of the most dangerous threat actors (lien direct) |
>ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks
|
Threat
|
|
|
|
2018-03-13 08:55:02 |
OceanLotus ships new backdoor using old tricks (lien direct) |
To smuggle the backdoor onto a targeted machine, the group uses a two-stage attack whereby a dropper package first gains a foothold on the system and sets the stage for the backdoor itself. This process involves some trickery commonly associated with targeted operations of this kind.
|
Threat
|
APT 32
|
|