The complexities of attack attribution

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published recently. Attributing a cyberattack to a specific threat actor is no easy task, as highlighted by new ESET research published this week. ESET experts recently uncovered a new APT group that they named CeranaKeeper and that … More The complexities of attack attribution

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos. Telegram, with nearly a billion monthly users, is a juicy target for cybercriminals, especially if they can exploit a zero-day vulnerability to spread malicious code. ESET malware researcher Lukasš Stefanko ran into one such exploit … More ESET Research Podcast: EvilVideo

Cyber-insurance and vulnerability scanning

Here’s how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals. Cyber-insurance has been an increasingly hot topic lately, with the cyber-insurance industry growing by 62 percent last year following an apparent surge in new contracts. In order to qualify … More Cyber-insurance and vulnerability scanning

Winter Vivern exploits zero-day vulnerability in RoundcubeWebmail servers

ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible. ESET Research has been closely tracking the cyberespionage operations of Winter Vivern for more than a year and, during our routine monitoring, we found that the group began exploiting a zero-day XSS vulnerability in the Roundcube Webmail server on October 11th, 2023. … More Winter Vivern exploits zero-day vulnerability in RoundcubeWebmail servers

Staying on top of security updates

Why keeping software up to date is a crucial security practice that should be followed by everyone from individual users to SMBs and large enterprises. This week, the US Cybersecurity and Infrastructure Security Agency (CISA) added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, citing solid evidence of active exploitation by attackers. The vulnerabilities, for … More Staying on top of security updates