ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol The post...
We Live Security RSS Feed
We Live Security RSS Feed
The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality The post...
And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in...
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected? The post One...
ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine...
The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT...
It’s never been easier to write a convincing message that can trick you into handing over your money or personal...
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they...
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?...
Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites The...