Critical infrastructure: Under cyberattack for longer than you might think

Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services. Just days ago, Ukraine’s power grid came under attack as the Sandworm group attempted to deploy a piece of malware called Industroyer2 against the operations of an energy supplier in the country. Industroyer2, uncovered during … More Critical infrastructure: Under cyberattack for longer than you might think

The algorithms that suggest your kids’ content

When considering mental health issues linked to online behavior, our thoughts may turn to cyberbullying, but there is another concern far more formidable than we might realize — access. Search engines have given us easy access to more and seemingly ever-fresh sources of content that have the potential to be just as detrimental, if not … More The algorithms that suggest your kids’ content

ESET Research discovers vulnerabilities in Lenovo consumer laptops exposing users to risk of UEFI malware installation

Exploitation of these vulnerabilities would allow attackers to deploy and successfully execute UEFI malware such as LoJax and ESPecter. UEFI threats can be extremely stealthy and dangerous. · Discovered vulnerabilities: CVE-2021-3970, CVE-2021-3971, CVE-2021-3972. ESET Research strongly advises all owners of Lenovo consumer laptops to go through the list of affected devices and update their firmware. … More ESET Research discovers vulnerabilities in Lenovo consumer laptops exposing users to risk of UEFI malware installation

Industroyer2: Industroyer reloaded

This ICS-capable malware targets a Ukrainian energy company. Executive summary The blogpost presents the analysis of a cyberattack against a Ukrainian energy provider. Key points: ESET researchers collaborated with CERT-UA to analyze the attack against the Ukrainian energy company The destructive actions were scheduled for 2022-04-08 but artefacts suggest that the attack had been planned … More Industroyer2: Industroyer reloaded

Coercion, trolling and abuse: Keep your children safe when they’re meeting people online

From predatory tactics to online bullying: tips for keeping your kids safe. Children and teenagers spend hours interacting with others on the internet. But social media and online gaming also give opportunities to those who want to harm your child. Such platforms allow anyone to access large online communities more or less anonymously, attracting bullies, … More Coercion, trolling and abuse: Keep your children safe when they’re meeting people online