ESET Threat Intelligence enhancing cybersecurity workflows with Filigran’s OpenCTI

ESET, a global leader in cybersecurity solutions, has announced a key strategic integration with Filigran, a leading provider of open-source threat intelligence management, to integrate ESET Threat Intelligence with its OpenCTI solution. ● ESET announces strategic integration with Filigran OpenCTI ● The integration of ESET Threat Intelligence (ETI) with Filigran’s OpenCTI solution will enable the … More ESET Threat Intelligence enhancing cybersecurity workflows with Filigran’s OpenCTI

ESET Research discovers Mozilla and Windows zero day & zero click vulnerabilities exploited by RomCom APT group

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit. ESET researchers discovered a previously unknown vulnerability, CVE-2024-9680, in Mozilla products, exploited in the wild by APT group RomCom. Further analysis revealed another zero-day vulnerability in … More ESET Research discovers Mozilla and Windows zero day & zero click vulnerabilities exploited by RomCom APT group

ESET Research discovers WolfsBane, new Linux cyberespionage backdoor by Gelsemium APT

ESET researchers have identified multiple samples of a Linux backdoor, which they named WolfsBane and attribute with high confidence to Gelsemium advanced persistent threat (APT) group. ESET researchers have identified multiple samples of a Linux backdoor, which they named WolfsBane and attribute with high confidence to Gelsemium advanced persistent threat (APT) group. The goal of … More ESET Research discovers WolfsBane, new Linux cyberespionage backdoor by Gelsemium APT

My information was stolen. Now what?

The slow and painful recovery process. Back in May 2023, I wrote the blogpost You may not care where you download software from, but malware does as a call to arms, warning about the risks of running software downloaded from so-called “trusted sources” of pirated software. Of course, those files were anything but trustworthy and contained malware, … More My information was stolen. Now what?