Winnti hacker group uses a new malware dubbed skip-2.0 to attack Microsoft SQL Servers and to gain persistence access. Winnti group believed...
The activities of government-sponsored hacker groups can have disastrous consequences. A group of digital forensics experts from ESET has revealed the existence...
Notorious cyberespionage group debases MSSQL
ESET researchers discover a trojanized Tor Browser distributed by cybercriminals to steal bitcoins from darknet market buyers
Digital forensics specialists report a new attack method consisting of the use of WAV audio files to hide and deliver backdoors and...
ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families
Researchers discovered a new track of ATM jackpotting attack through infamous ATM malware called “Cutlet Maker” which is now rapidly growing up...
Researchers discovered a new malware campaign from the Winnti threat group that utilizes the supply-chain attacks with a new set of artifacts to...
A team of ethical hacking specialists from security firm Confiant has revealed the discovery of a new malware variant for Mac devices....
According to digital forensics specialists, the hacker group identified as FIN7 has developed a new malicious tool, capable of delivering payloads directly...
New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks
Researchers discovered 2 new hacking tools called BOOSTWRITE and RDFSNIFFER that were added in FIN7 groups malware arsenal with sophisticated capabilities and...
ESET researchers discover a previously unreported cyberespionage platform used in targeted attacks against diplomatic missions and governmental institutions, and privacy-concerned users
Researchers discovered an ongoing malware campaign that believed to be operating by a Chinese based threat group called “Mustang Panda” that targets...
It seems that the FBI takes an increasingly permissive stance regarding ransomware infections and ransom payments. According to digital forensics specialists, the...
Cybersecurity solutions provider odix has set its sights on bringing enterprise-grade cybersecurity to small to medium businesses (SMBs). The company specializes in...
Researchers discovered an ongoing buggy malware campaign that attempts to exploit the newly discovered vulnerabilities resides in the WordPress theme and plugin....
Researchers linked multiple Cyber-espionage campaigns across Asia to the threat actor group PKPLUG. The group uses its PlugX malware and the number...
Turla APT threat actors distribute a new malware called Reductor, a successor of COMpfun to compromise the TLS encrypted web traffic and...
Last April information security audit specialists reported a ransomware infection in the IT systems of Stratford, a small city in Ontario region,...
Número dois in our series demystifying Latin American banking trojans