ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors

The exclusive research included in the report provides previously unpublished information about APT group operations: ProxyShell exploitation; OilRig campaign and activities by the infamous cyberespionage group the Dukes (aka Cozy Bear). ProxyLogon vulnerability was the second most frequent external attack vector in ESET’s 2021 statistics, right after password-guessing attacks. Microsoft Exchange servers fell under siege … More ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors

ESET recognized as Top Player in Radicati Endpoint Security Market Quadrant

ESET, has been recognized as a Top Player in Radicati’s 2021 Endpoint Security Market Quadrant. The report offers a competitive view of key players in endpoint security and ESET‘s inclusion in the report signifies its leading position alongside 17 of its market peers, assessing their products’ functionality and the business’ strategic vision. The Radicati report … More ESET recognized as Top Player in Radicati Endpoint Security Market Quadrant

Think before you scan: How fraudsters can exploit QR codes to steal money

QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares. QR codes are having a moment. The humble squares may have been around since 1994, but it wasn’t until the COVID-19 era that they became a truly household name. These days, you can spot … More Think before you scan: How fraudsters can exploit QR codes to steal money

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them. We live in an age of pervasive connectivity. But our always-on, mobile-centric lives also expose us to risk. For many people, it is the prospect of phishing, remotely deployed malware … More Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone