Manufacturing under fire: Strengthening cyber-defenses amid surging threats
制造商在最无情的威胁环境中运营,面临着一系列独特的压力,这些压力使得攻击极具破坏性
New spyware campaigns target privacy-conscious Android users in the UAE
ESET 研究人员发现,针对阿拉伯联合酋长国的用户,散布伪装成 Android Signal 和 ToTok 应用程序的间谍软件的活动
Cybersecurity Awareness Month 2025: Knowledge is power
我们将在这个月开始时重点关注人的因素:第一道防线,但也是许多网络犯罪分子阻力最小的路径
This month in security with Tony Anscombe – September 2025 edition
过去 30 天不乏新的威胁和事件,这些都凸显了制定深思熟虑的网络弹性计划的必要性
Roblox executors: It’s all fun and games until someone gets hacked
当您下载承诺快速获胜的作弊工具时,您可能会得到比您预想的更多的东西
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
恶意软件运营商与朝鲜秘密 IT 工人合作,对猎头公司和求职者构成威胁
Watch out for SVG files booby-trapped with malware
随着网络犯罪分子越来越多地利用 SVG 文件作为隐形恶意软件的传递载体,所见并不总是所见
Small businesses, big targets: Protecting your business against ransomware
早已知道是网络犯罪分子的最佳地点,小型企业比大型企业更有可能受到勒索软件的伤害
HybridPetya: The Petya/NotPetya copycat comes with a twist
Hybridpetya是使用UEFI Secure Boot旁路功能
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
petya/notpetya的uefi copycat利用CVE-2024-7344在Virustotal上发现的CVE-2024-7344
Are cybercriminals hacking your systems – or just logging in?
作为不良演员,通常只需通过钥匙才能通过公司的数字前门华尔兹
Preventing business disruption and building cyber-resilience with MDR
鉴于事件的严重财务和声誉风险将业务陷入停顿,组织需要优先考虑预防优先的网络安全策略
Under lock and key: Safeguarding business data with encryption
随着攻击表面的扩展,威胁景观越来越复杂,是时候考虑您的数据保护策略适合目的
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
style="text-indent: 2em; "ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
This month in security with Tony Anscombe – August 2025 edition
从元关闭了数百万的WhatsApp帐户,这些帐户一直链接到骗局中心到欧洲的水设施的攻击,2025年8月,没有缺乏影响力的网络安全新闻
Don’t let “back to school” become “back to (cyber)bullying”
网络欺凌是我们以数字为中心社会的生活的事实,但是有多种方法可以推迟
First known AI-powered ransomware uncovered by ESET Research
提示锁的发现显示了AI模型的恶意使用如何增强勒索软件和其他威胁