ESET discovers Operation Spalax: Colombian government and industry sector under targeted attack

In 2020, ESET researchers observed several attacks exclusively targeting Colombian entities, which have collectively been dubbed Operation Spalax. These attacks are ongoing and are focused on both government institutions and private companies, especially in the energy and metallurgical industries. The attackers rely on the use of remote access trojans, most likely to conduct cyber-espionage activities.  … More ESET discovers Operation Spalax: Colombian government and industry sector under targeted attack

ESET Research uncovers APT-C-23 group’s new Android spyware masked as Threema and Telegram

ESET researchers uncover a new version of Android spyware used by the APT-C-23 threat group against targets in the Middle East. ESET researchers have analyzed a new version of Android spyware used by APT-C-23, a threat group active since at least 2017 that is known for mainly targeting the Middle East. The new spyware, detected … More ESET Research uncovers APT-C-23 group’s new Android spyware masked as Threema and Telegram

Learning to recognize malware and its dirty tricks

The digital world knows many threats and malware can be one of the nastiest. To keep children, teenagers as well as adults safe, we will go over the most common types and forms of malicious code they can encounter and offer actionable tips. What is malware? Let’s start with the word malware. It is a blend of … More Learning to recognize malware and its dirty tricks

Protect the privacy of your children and cover their webcams

Laptops, smartphones and tablets – most of today’s smart devices come with a built-in camera. Thanks to technological advances, it doesn’t matter if your friend lives down the street or on the other side of the world, their webcam lets you have an (almost) face-to-face chat anytime. Video calls, selfies, vlogging, and the little lenses … More Protect the privacy of your children and cover their webcams

Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface. In May 2020, Björn Ruytenberg, a computer security researcher at the Eindhoven University of Technology in the Netherlands, announced the discovery of Thunderspy, a series of vulnerabilities in the Thunderbolt technology and interrelated scenarios for changing – including disabling – … More Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe