Here’s what to know about the malware that tops infostealer charts in 2025 and has an insatiable appetite for valuable data.
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”.
As the number of softwarevulnerabilities continues to increase, delaying or skipping security updates could cost your ...
Some Minecraft “hacks” don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a ...
We have discovered a previously unreported version of Android spyware used by APT-C-23, a threat group also known as Two-tailed Scorpion and mainly targeting the Middle East. ESET products detect the ...
As ransomware rages on, no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
Smartwatches, fitness trackers, and other wearables are fast becoming almost as familiar to us as our mobile phones and tablets. These connected gadgets do much more than tell the time. They track our ...
Some Minecraft 'hacks' don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod. Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a ...
For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In the midst of routine monitoring of suspicious activities on the systems of ...
Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers. After all, what better time to strike than when the potential ...
ESET researchers have uncovered two Android spyware campaigns targeting individuals interested in secure communication apps, namely Signal and ToTok. These campaigns distribute malware through ...