Machine learning by ESET: The road to Augur

Machine learning (ML) in eight blogposts?! In truth, we’ve only just scratched the surface when it comes to the potential of ML in cybersecurity. However, that said, readers should now be better able to separate fact from fiction, and marketing from actual function. So, last but not least, let’s take a peek under the hood … More Machine learning by ESET: The road to Augur

Industroyer: ICS were developed decades ago with no security in mind

On December 17th, 2016, the Ukrainian capital Kiev was hit by a blackout for about 75 minutes. Local investigators later confirmed that the energy outage was caused by a cyberattack. Shortly thereafter, ESET researchers analyzed a sophisticated new malware, which is the main suspect in this case. They have named it Industroyer – the biggest threat to Industrial Control … More Industroyer: ICS were developed decades ago with no security in mind

Web-hosting firm agrees to pay over $1 million to ransomware extortionists

Nayana, a South Korean web hosting firm, was hit hard by a ransomware attack earlier this month which hit over 153 of its Linux servers, and impacting over 3,400 websites the company hosts for its business customers. Nayana’s systems are thought to have been hit by a Linux variant of the Erebus ransomware, designed to … More Web-hosting firm agrees to pay over $1 million to ransomware extortionists

Trends 2017: Mobile security – the reality of malware … augmented

Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities similar to any desktop. It is clear today that our smartphones and tablets have evolved beyond this point, creating new means of technological interaction not previously imagined. For more detail, check out Denise Giusto Bilic’s piece here.

ESET Threat Intelligence service launched for Enterprise Customers to help prevent attacks such as WannaCryptor

ESET Threat Intelligence, a service that predicts and proactively notifies enterprise customers about real-time threats such as WannaCryptor ransomware or the EternalBlue exploit, has been made globally available to ESET customers today. ESET Threat Intelligence is built on a unique blend of ESET’s core disciplinary knowledge, advanced heuristics and technologies such as machine learning.  The service … More ESET Threat Intelligence service launched for Enterprise Customers to help prevent attacks such as WannaCryptor

Malicious registry keys: Reflective injection

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both by security solutions and the human eye. In recent months, we have started to receive various reports about suspicious and … More Malicious registry keys: Reflective injection