News

The disruption operation, led by Microsoft, aims to seize all known Lumma Stealer C&C domains, rendering Lumma Stealer’s exfiltration infrastructure nonfunctional. ESET will continue to track other ...
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report ...
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers ...
Votre iPhone n'est pas nécessairement aussi invulnérable aux menaces de sécurité que vous ne le pensez. Voici les principaux ...
Operation RoundPress exploits security holes in webmail software to target Ukrainian governmental entities and defense ...
This blogpost introduces an operation that we named RoundPress, targeting high-value webmail servers with XSS vulnerabilities, and that we assess with medium confidence is run by the Sednit ...
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU Ever wondered why a ...
iPhones gelten gemeinhin als die Fort Knox der Smartphones. Geschlossenes System, strenge App-Store-Richtlinien, schnelle Updates – wer ein iPhone besitzt, fühlt sich meist auf der sicheren Seite.
La mayoría de los modelos LLM tienen «barreras morales» para no hacer cosas malas, el equivalente digital de la máxima de la medicina de «primero, no hacer daño». Si le preguntas cómo ...
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation, one of the most ...