A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H1 2025
Category: welivesecurity
BladedFeline: Whispering in the dark
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig This article has been indexed from WeLiveSecurity Read the original article: BladedFeline: Whispering in the dark
Don’t let dormant accounts become a doorway for cybercriminals
Do you have online accounts you haven’t used in years? If so, a bit of digital spring cleaning might be in order. This article has been indexed from WeLiveSecurity Read the original article: Don’t let dormant accounts become a doorway…
This month in security with Tony Anscombe – May 2025 edition
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it’s a wrap on another month filled with impactful cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in…
Word to the wise: Beware of fake Docusign emails
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data This article has been indexed from WeLiveSecurity Read the original article: Word to the wise: Beware of fake…
Danabot under the microscope
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure This article has been indexed from WeLiveSecurity Read the original article: Danabot under the microscope
Lumma Stealer: Down for the count
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies This article has been indexed from WeLiveSecurity Read the original article: Lumma Stealer: Down for…
Danabot: Analyzing a fallen empire
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation This article has been indexed from WeLiveSecurity Read the original article: Danabot: Analyzing a fallen empire
ESET takes part in global operation to disrupt Lumma Stealer
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation This article has been indexed from WeLiveSecurity Read the original article: ESET takes part in global operation to disrupt Lumma Stealer
ESET APT Activity Report Q4 2024–Q1 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4 2024–Q1 2025
The who, where, and how of APT attacks in Q4 2024–Q1 2025
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: The who, where, and how of APT attacks in Q4…
Operation RoundPress
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities This article has been indexed from WeLiveSecurity Read the original article: Operation RoundPress
Sednit abuses XSS flaws to hit gov’t entities, defense companies
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU This article has been indexed from WeLiveSecurity Read the original article: Sednit abuses XSS flaws to…
How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world. This article has been indexed from…
Catching a phish with many faces
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly This article has been indexed from WeLiveSecurity Read the original article: Catching a phish with many…
Beware of phone scams demanding money for ‘missed jury duty’
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer. This article has been indexed from WeLiveSecurity Read the original article: Beware…
Toll road scams are in overdrive: Here’s how to protect yourself
Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam. This article has been indexed from WeLiveSecurity Read the original article: Toll road scams are in overdrive: Here’s…
RSAC 2025 wrap-up – Week in security with Tony Anscombe
From the power of collaborative defense to identity security and AI, catch up on the event’s key themes and discussions This article has been indexed from WeLiveSecurity Read the original article: RSAC 2025 wrap-up – Week in security with Tony…
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks This article has been indexed from WeLiveSecurity Read the original article: TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
This month in security with Tony Anscombe – April 2025 edition
From the near-demise of MITRE’s CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity This article has been indexed from WeLiveSecurity Read the original article: This month…