Plato Data Intelligence.
Vertical Search & Ai.

Tag: ESET

VajraSpy: A Patchwork of espionage apps

ESET researchers have identified twelve Android espionage apps that share the same malicious code: six were available on Google Play, and six were found...

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android...

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET has collaborated with the Federal Police of Brazil in an attempt to disrupt the Grandoreiro botnet. ESET contributed to the project by providing...

Newly ID’ed Chinese APT Hides Backdoor in Software Updates

Since 2018, a previously unknown Chinese threat actor has been using a novel backdoor in adversary-in-the-middle (AitM) cyber-espionage attacks against Chinese and Japanese targets.Specific...

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

Video The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and...

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

ESET researchers provide an analysis of an attack carried out by a previously undisclosed China-aligned threat actor we have named Blackwood, and that we...

Break the fake: The race is on to stop voice cloning fraud

Scams As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’...

Attack of the copycats: How impostor apps and fake app mods could bite you

Mobile Security WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride. Phil...

FTC offers cash for best ideas to stymie AI voice cloning

The Federal Trade Commission (FTC) is promising a $25,000 reward for the best solution to combat the growing threat of AI voice cloning. Sometimes referred...

Cybersecurity trends and challenges to watch out for in 2024

Video What are some of the key cybersecurity trends that people and organizations should have on their radars this year? 05...

Multi-Factor Authentication Market – Global Forecast to 2028: Growing Instances of Data Breaches, Rising Adoption of BYOD Trends, and Stringent Regulations to Drive Growth...

DUBLIN–(BUSINESS WIRE)–The “Multi-Factor Authentication Market by Authentication Type (Password-Based Authentication, Passwordless Authentication), Component (Hardware, Software, Services), Model Type, End User Industry and Region –...

Got a new device? 7 things to do before disposing of your old gadget

Digital Security Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information Phil Muncaster...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?