Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors. Outdated devices are often easy targets for attackers, especially if they have vulnerabilities that can be exploited and no patches are available due to their end-of-life status. Hacks of outdated or vulnerable devices are an issue, but why would anyone attempt … More Old devices, new dangers: The risks of unsupported IoT tech

That’s how easy it is to hack your phone

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukas demonstrate how easy it is to take over your phone, with some added tips on how to stay secure. Android threats are a serious business. Among them is the Blue Ducky script, which exploits the CVE-2023-45866 Android device vulnerability.  By running … More That’s how easy it is to hack your phone

ESET Research discovers NGate: Android malware, which relays NFC traffic to steal victim’s cash from ATMs

The malware used, which ESET has named NGate, has the unique ability to relay NFC data from victims’ payment cards via a malicious app installed on their Android devices, to the device of a perpetrator waiting at an ATM  ESET researchers uncovered a crimeware campaign that targeted clients at three Czech banks. The primary goal … More ESET Research discovers NGate: Android malware, which relays NFC traffic to steal victim’s cash from ATMs

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with. Governments create legislation and regulations primarily to protect public interests and keep order, ensuring society functions as it should. When related to cyber insurance … More How regulatory standards and cyber insurance inform each other

Be careful what you pwish for – Phishing in PWA applications

ESET analysts dissect a novel phishing method tailored to Android and iOS users. In this blogpost we discuss an uncommon type of phishing campaign targeting mobile users and analyze a case that we observed in the wild that targeted clients of a prominent Czech bank. This technique is noteworthy because it installs a phishing application … More Be careful what you pwish for – Phishing in PWA applications