ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes. In this episode of the ESET Research Podcast, we dissect the most interesting findings of the ESET Threat Report H2 2023, including threat actors trying to leverage the AI hype, probably the … More ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research joins global operation to disrupt the Grandoreiro banking trojan operating in Latin America and Spain

ESET worked alongside the Federal Police of Brazil in an attempt to disrupt the Grandoreiro botnet. ESET collaborated with the Federal Police of Brazil in an attempt to disrupt the Grandoreiro botnet. ESET contributed to the project by providing technical analysis, statistical information, and known command and control (C&C) server domain names and IP addresses. … More ESET Research joins global operation to disrupt the Grandoreiro banking trojan operating in Latin America and Spain

Cyber: The Swiss army knife of tradecraft

In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike. For thousands of years, nations have engaged in espionage, spying on their neighbors, allies, and adversaries. Traditionally, this realm of “espionage” relied heavily on human intelligence, but that started changing in the … More Cyber: The Swiss army knife of tradecraft

Mother of all breaches reveals 26 billion records

Security researchers have warned that a database containing over 26 billion leaked data records has been discovered. According to researchers from Security Discovery and CyberNews, the newly discovered database of leaked data runs to 12 terabytes in size and deserves the MOAB title. According to the team, while the leaked dataset contains mostly information from … More Mother of all breaches reveals 26 billion records

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on cybersecurity is not sustainable – it’s time to take control through effective supplier risk management. The world is built on supply chains. They are the connective tissue that facilitates global trade and prosperity. But these networks of overlapping and inter-related companies are increasingly complex and opaque. Most involve … More Assessing and mitigating supply chain cybersecurity risks