Information

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

ESET Research The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023 ESET Research 14 Jun 2024  •  , 2 min. read In this episode of the ESET Research Podcast, we dissect the most interesting findings of the Q4 2023–Q1 2024 ESET APT Activity Report, uncovering the activity of multiple advanced persistent threat (APT) groups around…

Read More

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

Video The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app 14 Jun 2024 This week, ESET researchers released their findings about five campaigns that used trojanized apps to target Android users in Egypt and Palestine. Initiated in 2022, the campaigns were likely orchestrated by the Arid Viper APT group, with three of them remaining active to this day.…

Read More

Arid Viper poisons Android apps with AridSpy

ESET researchers have identified five campaigns targeting Android users with trojanized apps. Most probably carried out by the Arid Viper APT group, these campaigns started in 2022 and three of them are still ongoing at the time of the publication of this blogpost. They deploy multistage Android spyware, which we named AridSpy, that downloads first- and second-stage payloads from its C&C server to assist it avoiding detection. The malware is distributed through dedicated websites impersonating…

Read More

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

Digital Security Drumroll, please! The winners of the 2024 European Cybersecurity Blogger Awards have been chosen, and we couldn’t be prouder – WeLiveSecurity has been named the Best Cybersecurity Vendor Blog! 10 Jun 2024  •  , 2 min. read We’re delighted to announce that WeLiveSecurity has been named the Best Cybersecurity Vendor Blog at this year’s edition of the European Cybersecurity Blogger Awards. It’s an honor to have the collective talent and work of ESET’s…

Read More

Patch Tuesday, June 2024 “Recall” Edition

Microsoft today released updates to fix more than 50 security vulnerabilities in Windows and related software, a relatively light Patch Tuesday this month for Windows users. The software giant also responded to a torrent of negative feedback on a new feature of Redmond’s flagship operating system that constantly takes screenshots of whatever users are doing on their computers, saying the feature would no longer be enabled by default. Last month, Microsoft debuted Copilot+ PCs, an…

Read More

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

Video Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data. Watch as Tony discusses the story and provides useful tips on how to protect people’s data. 07 Jun 2024 Ticketmaster has reportedly been breached by a hacker group known as ShinyHunters, who claim to have exfiltrated 1.3 terabytes of personally identifiable information on 560 million Ticketmaster customers. Live Nation Entertainment, Ticketmaster’s parent company,…

Read More

The job hunter’s guide: Separating genuine offers from scams

Scams $90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This and many other job offers are fake though – made just to ensnare unsuspecting victims into giving up their data. Márk Szabó 06 Jun 2024  •  , 5 min. read Seeking a job these days can be quite difficult, with many employers looking to freeze hiring or not hire as…

Read More

The murky world of password leaks – and how to check if you’ve been hit

How To Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look Márk Szabó 03 Jun 2024  •  , 6 min. read Recently, I came across a report detailing “the mother of all breaches” – or to be more exact, the leak of a vast compilation of data that was stolen during a number of attacks on…

Read More

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

Video A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology’s accuracy and reliability 31 May 2024 A woman from London has been wrongly accused of being a shoplifter after being flagged by a facial-recognition system, the BBC reports. The tech, called Facewatch, is used by a number of retailers across the United Kingdom, including by the Home Bargains store where the woman was…

Read More

AI in HR: Is artificial intelligence changing how we hire employees forever?

In the age of digital transformation, Artificial Intelligence (AI) has swiftly become a cornerstone of organizational operations. Recruitment – a process that all organizations of any size will have to undertake at some point – is no exception. However, the talent acquisition landscape is a bit of a minefield with an average of over 250 applicants for a corporate job opening, resulting in busy recruiters typically spending only 6-8 seconds looking at each CV. When…

Read More