Phishing awareness training: Help your employees avoid the hook

Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders. Security by design has long been something of a holy grail for cybersecurity professionals. It’s a simple concept: ensure products are designed to be as secure as possible in order to minimize the chances of compromise further down the line. … More Phishing awareness training: Help your employees avoid the hook

Crypto mixers: What are they and how are they used?

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money. Coined during Al Capone’s times, the term ”money laundering” has since entered the general lexicon as criminals have been busy obscuring the source of their ill-gotten assets and making it appear as if the funds have come from … More Crypto mixers: What are they and how are they used?

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents? One of the key findings from the ESET Threat Report T1 2022 is that the Emotet botnet has risen, Phoenix-like, from the ashes, pumping out vast amounts of spam in … More How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Industroyer: A cyber‑weapon that brought down a power grid

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids. On June 12th 2017, ESET researchers published their findings about unique malware that was capable of causing a widespread blackout. Industroyer, as they named it, was the first known piece of malware that was developed specifically to … More Industroyer: A cyber‑weapon that brought down a power grid

Introducing ESET NetProtect: Fighting threats at the DNS level

The DNS, the internet’s address book, has long been plagued by malicious domains with little hope for effective recourse against this abuse by its bookkeepers: the registrars. ESET brings its protective technology to bear on this issue. Since the early 1980s, the Domain Name System (DNS) has been used for looking up the Internet Protocol … More Introducing ESET NetProtect: Fighting threats at the DNS level