ESET discovers new APT group and its supply chain attack on South Korean VPN service

ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a newly discovered and previously undetected China-aligned APT group that ESET has named PlushDaemon. In this cyberespionage operation, the attackers replaced the legitimate installer with one that also deployed the group’s signature implant, which ESET has named SlowStepper — a … More ESET discovers new APT group and its supply chain attack on South Korean VPN service

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU. Running AI workloads with sensitive data in the public cloud has its disadvantages, but a new generation of laptops can now perform many of the same tasks locally, in … More AI moves to your PC with its own special hardware

Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow. A presentation that includes in its title “Compromise of Modern Vehicles” may set the expectation that you are about to see a dramatic demonstration of a hacked car suddenly stopping or swerving … More Hacking a car – or rather, its infotainment system

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost. The modern smartphone has become an indispensable piece of technology. These powerful, pocket-sized computers enable us to do everything from hailing cabs to consulting with our local … More Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Cyberespionage the Gamaredon way

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics. When describing state-backed threat actors, one would probably expect a super sophisticated, stealthy group capable of avoiding all alarms and defenses with surgical precision. With Gamaredon, most of that goes out the … More Cyberespionage the Gamaredon way