ESET Research: Spy group exploits WPS Office zero day; analysis uncovers a second vulnerability

ESET researchers discovered a remote code execution vulnerability in WPS Office for Windows (CVE-2024-7262). The vulnerability was being exploited by APT-C-60, allegedly a South Korea-aligned cyberespionage group, to target East Asian countries. When examining the root cause, ESET discovered another way to exploit the faulty code (CVE-2924-7263). Following a coordinated disclosure process, both vulnerabilities are … More ESET Research: Spy group exploits WPS Office zero day; analysis uncovers a second vulnerability

Beware of Ticket Scammers on Social Media: Don’t Let Fake Promises Ruin Your Concert Experience

As the excitement builds for Coldplay’s upcoming gigs at Croke Park and fans eagerly await tickets for the much-anticipated Oasis reunion in 2025, the spectre of ticket scammers looms larger than ever. These opportunistic fraudsters are perfectly poised to exploit the fervour of fans desperate to catch their favourite bands live. The Allure of Last-Minute … More Beware of Ticket Scammers on Social Media: Don’t Let Fake Promises Ruin Your Concert Experience

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors. Outdated devices are often easy targets for attackers, especially if they have vulnerabilities that can be exploited and no patches are available due to their end-of-life status. Hacks of outdated or vulnerable devices are an issue, but why would anyone attempt … More Old devices, new dangers: The risks of unsupported IoT tech

That’s how easy it is to hack your phone

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukas demonstrate how easy it is to take over your phone, with some added tips on how to stay secure. Android threats are a serious business. Among them is the Blue Ducky script, which exploits the CVE-2023-45866 Android device vulnerability.  By running … More That’s how easy it is to hack your phone

ESET Research discovers NGate: Android malware, which relays NFC traffic to steal victim’s cash from ATMs

The malware used, which ESET has named NGate, has the unique ability to relay NFC data from victims’ payment cards via a malicious app installed on their Android devices, to the device of a perpetrator waiting at an ATM  ESET researchers uncovered a crimeware campaign that targeted clients at three Czech banks. The primary goal … More ESET Research discovers NGate: Android malware, which relays NFC traffic to steal victim’s cash from ATMs