ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors

The exclusive research included in the report provides previously unpublished information about APT group operations: ProxyShell exploitation; OilRig campaign and activities by the infamous cyberespionage group the Dukes (aka Cozy Bear). ProxyLogon vulnerability was the second most frequent external attack vector in ESET’s 2021 statistics, right after password-guessing attacks. Microsoft Exchange servers fell under siege … More ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors

ESET recognized as Top Player in Radicati Endpoint Security Market Quadrant

ESET, has been recognized as a Top Player in Radicati’s 2021 Endpoint Security Market Quadrant. The report offers a competitive view of key players in endpoint security and ESET‘s inclusion in the report signifies its leading position alongside 17 of its market peers, assessing their products’ functionality and the business’ strategic vision. The Radicati report … More ESET recognized as Top Player in Radicati Endpoint Security Market Quadrant

Think before you scan: How fraudsters can exploit QR codes to steal money

QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares. QR codes are having a moment. The humble squares may have been around since 1994, but it wasn’t until the COVID-19 era that they became a truly household name. These days, you can spot … More Think before you scan: How fraudsters can exploit QR codes to steal money

Beyond the tick box: What to consider before agreeing to a privacy policy

The trade-off between using a free service and giving up our personal data becomes much less palatable when we think about the wider ramifications of the collection and use of our personal data. The doorbell rings, you answer, and a representative of a large company is on the doorstep offering to allow you to use … More Beyond the tick box: What to consider before agreeing to a privacy policy