ESET Research discovers vulnerabilities in Lenovo consumer laptops exposing users to risk of UEFI malware installation

Exploitation of these vulnerabilities would allow attackers to deploy and successfully execute UEFI malware such as LoJax and ESPecter. UEFI threats can be extremely stealthy and dangerous. · Discovered vulnerabilities: CVE-2021-3970, CVE-2021-3971, CVE-2021-3972. ESET Research strongly advises all owners of Lenovo consumer laptops to go through the list of affected devices and update their firmware. … More ESET Research discovers vulnerabilities in Lenovo consumer laptops exposing users to risk of UEFI malware installation

Industroyer2: Industroyer reloaded

This ICS-capable malware targets a Ukrainian energy company. Executive summary The blogpost presents the analysis of a cyberattack against a Ukrainian energy provider. Key points: ESET researchers collaborated with CERT-UA to analyze the attack against the Ukrainian energy company The destructive actions were scheduled for 2022-04-08 but artefacts suggest that the attack had been planned … More Industroyer2: Industroyer reloaded

Coercion, trolling and abuse: Keep your children safe when they’re meeting people online

From predatory tactics to online bullying: tips for keeping your kids safe. Children and teenagers spend hours interacting with others on the internet. But social media and online gaming also give opportunities to those who want to harm your child. Such platforms allow anyone to access large online communities more or less anonymously, attracting bullies, … More Coercion, trolling and abuse: Keep your children safe when they’re meeting people online

How secure is your cloud storage? Mitigating data security risks in the cloud

As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice. For weeks, cybersecurity experts and government agencies have been urging organizations to enhance their cyber-defenses due to the increased threat of cyberattacks. That means not only improving detection and response for emerging … More How secure is your cloud storage? Mitigating data security risks in the cloud

New Windows on ARM64 device? ESET protects both at work and at play

After the successful launch of its business-oriented siblings, ESET has extended its latest technology to home users/consumers and stands ready to protect their Windows on Arm-based devices with our award-wining full-featured products. Our development teams put a lot of effort into reengineering ESET’s already mature security technology for ARM-powered devices, which are increasingly used in both … More New Windows on ARM64 device? ESET protects both at work and at play