ESET Research discovers Mozilla and Windows zero day & zero click vulnerabilities exploited by RomCom APT group

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit. ESET researchers discovered a previously unknown vulnerability, CVE-2024-9680, in Mozilla products, exploited in the wild by APT group RomCom. Further analysis revealed another zero-day vulnerability in … More ESET Research discovers Mozilla and Windows zero day & zero click vulnerabilities exploited by RomCom APT group

ESET Research discovers WolfsBane, new Linux cyberespionage backdoor by Gelsemium APT

ESET researchers have identified multiple samples of a Linux backdoor, which they named WolfsBane and attribute with high confidence to Gelsemium advanced persistent threat (APT) group. ESET researchers have identified multiple samples of a Linux backdoor, which they named WolfsBane and attribute with high confidence to Gelsemium advanced persistent threat (APT) group. The goal of … More ESET Research discovers WolfsBane, new Linux cyberespionage backdoor by Gelsemium APT

Is your child’s phone making them sick?

Gadgets provide immense learning opportunities and entertainment, but they have also introduced a new challenge for parents and educators: phone addiction among children. In the digital age, technology has become a constant companion in our lives, and even more so for the generation that we born into this new age. They are growing up surrounded … More Is your child’s phone making them sick?

My information was stolen. Now what?

The slow and painful recovery process. Back in May 2023, I wrote the blogpost You may not care where you download software from, but malware does as a call to arms, warning about the risks of running software downloaded from so-called “trusted sources” of pirated software. Of course, those files were anything but trustworthy and contained malware, … More My information was stolen. Now what?