Cyberespionage the Gamaredon way

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics. When describing state-backed threat actors, one would probably expect a super sophisticated, stealthy group capable of avoiding all alarms and defenses with surgical precision. With Gamaredon, most of that goes out the … More Cyberespionage the Gamaredon way

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world Some cybercriminal groups are sophisticated, create advanced schemes, cooperate with other attackers and do everything to stay under the radar. Then there are threat actors like CosmicBeetle – they lack the … More ESET Research Podcast: CosmicBeetle

ESET boosts its home security to protect your family against identity theft and ransomware

In a world where cybercriminals can abuse AI to create fake recordings of your face needed to bypass video-based authentication, or where phishing copycats of legitimate websites are almost unrecognisable from their real counterparts, and media repeatedly inform us about huge data breaches, it is no surprise that the general public is worried about what the future holds.  Even tech-savvy and vigilant home … More ESET boosts its home security to protect your family against identity theft and ransomware

ESET bulks up its ESET HOME consumer protections against identity theft, ransomware, phishing, and more

ESET, a global leader in cybersecurity solutions, announced the launch of its upgraded consumer offering ESET HOME Security, introducing new features such as ESET Folder Guard and Multithread Scanning, together with an overall improvement of its capabilities. Identity Protection* featuring Dark Web Monitoring is now globally available.    These enhancements to ESET HOME Security, as an all-in-one solution … More ESET bulks up its ESET HOME consumer protections against identity theft, ransomware, phishing, and more

The complexities of attack attribution

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published recently. Attributing a cyberattack to a specific threat actor is no easy task, as highlighted by new ESET research published this week. ESET experts recently uncovered a new APT group that they named CeranaKeeper and that … More The complexities of attack attribution