Information

IT service desks: The security blind spot that may put your business at risk

Business Security Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap. Phil Muncaster 15 Oct 2025  •  , 5 min. read Supply chain risk is surging among global businesses. Verizon claims that third-party involvement in data breaches doubled over the past year to 30%. Yet usually this kind of risk is framed in terms of problems with open source…

Read More

Minecraft mods: Should you ‘hack’ your game?

Kids Online Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod. Fabiana Ramírez Cuenca 16 Oct 2025  •  , 5 min. read Gaming is one of the defining pastimes of the digital age, and for many children, it’s also their first real experience with online communities. This is where platforms like Minecraft and Roblox stand out, as they have transformed gaming into a space…

Read More

ESET APT Activity Report Q2 2025–Q3 2025

ESET Research Threat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 Jean-Ian Boutin 06 Nov 2025  •  , 4 min. read ESET APT Activity Report Q2 2025–Q3 2025 summarizes notable activities of selected advanced persistent threat (APT) groups that were documented by ESET researchers from April through September 2025. The highlighted operations are representative of the broader landscape of threats we…

Read More

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat? 20 Oct 2025 According to Verizon’s 2025 Data Breach Investigations Report (DBIR), no less than 44 percent of breaches last year involved ransomware, highlighting the enduring threat that this form of cyber-extortion poses for organizations of all sizes. Meanwhile, a recent report from Coalition Inc. found that 40 percent of cyber-insurance policyholders…

Read More

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data Christian Ali Bravo 05 Nov 2025  •  , 4 min. read Scams and other threats that are doing the rounds on messaging apps like WhatsApp are a stark reminder of how easily even trusted platforms can be weaponized against us. One deceptive tactic that has gained traction recently involves tricking people into sharing their phone screens during a…

Read More

SnakeStealer: How it preys on personal data – and how you can protect yourself

Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year’s infostealer detection charts Martina López 22 Oct 2025  •  , 3 min. read Infostealers remain one of the most persistent threats on today’s threat landscape. They’re built to quietly siphon off valuable information, typically login credentials and financial and cryptocurrency details, from compromised systems and send it to adversaries. And they do so…

Read More

Cloudflare Scrubs Aisuru Botnet from Top Domains List

For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru’s overlords are using the botnet to boost their malicious domain rankings, while simultaneously attacking the company’s domain name system (DNS) service. The #1 and #3 positions in…

Read More

Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures 24 Oct 2025 In the remote and hybrid work era, employee use of unsanctioned hardware and software (known as shadow IT) has become an acute problem that results in security gaps along with potential data loss and compliance issues. The stakes grow further as employees increasingly use generative AI tools for productivity and convenience while their employers lose…

Read More

Gotta fly: Lazarus targets the UAV sector

ESET researchers have recently observed a new instance of Operation DreamJob – a campaign that we track under the umbrella of North Korea-aligned Lazarus – in which several European companies active in the defense industry were targeted. Some of these are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea’s current efforts to scale up its drone program. This blogpost discusses the broader geopolitical implications…

Read More

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead 04 Nov 2025 Why do people fall for scams even when they should know better? It’s a question that says more about human nature than about technology. In this episode of Unlocked 403, Becks is joined by Alena Košinárová, a software engineer at ESET…

Read More