CyberSecurity Updates

The who, where, and how of APT attacks in Q2 2025–Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report 07 Nov 2025 Yesterday, the ESET research team released the latest issue of its APT Activity Report that summarizes and contextualizes the cyber-operations of some of the world’s most notorious state-aligned hacking groups from April to September 2025. The report documents how the groups targeted entities across sectors and geographies in an attempt to…

Read More

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025  •  , 7 min. read The cybersecurity community lost one of its luminaries with the passing of David Harley last week, at the age of 76. Despite being a self-described late entrant to IT, David went on to forge a long and distinguished career in cybersecurity that stretched from the early…

Read More

IT service desks: The security blind spot that may put your business at risk

Business Security Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap. Phil Muncaster 15 Oct 2025  •  , 5 min. read Supply chain risk is surging among global businesses. Verizon claims that third-party involvement in data breaches doubled over the past year to 30%. Yet usually this kind of risk is framed in terms of problems with open source…

Read More

Minecraft mods: Should you ‘hack’ your game?

Kids Online Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod. Fabiana Ramírez Cuenca 16 Oct 2025  •  , 5 min. read Gaming is one of the defining pastimes of the digital age, and for many children, it’s also their first real experience with online communities. This is where platforms like Minecraft and Roblox stand out, as they have transformed gaming into a space…

Read More

ESET APT Activity Report Q2 2025–Q3 2025

ESET Research Threat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 Jean-Ian Boutin 06 Nov 2025  •  , 4 min. read ESET APT Activity Report Q2 2025–Q3 2025 summarizes notable activities of selected advanced persistent threat (APT) groups that were documented by ESET researchers from April through September 2025. The highlighted operations are representative of the broader landscape of threats we…

Read More

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat? 20 Oct 2025 According to Verizon’s 2025 Data Breach Investigations Report (DBIR), no less than 44 percent of breaches last year involved ransomware, highlighting the enduring threat that this form of cyber-extortion poses for organizations of all sizes. Meanwhile, a recent report from Coalition Inc. found that 40 percent of cyber-insurance policyholders…

Read More

SnakeStealer: How it preys on personal data – and how you can protect yourself

Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year’s infostealer detection charts Martina López 22 Oct 2025  •  , 3 min. read Infostealers remain one of the most persistent threats on today’s threat landscape. They’re built to quietly siphon off valuable information, typically login credentials and financial and cryptocurrency details, from compromised systems and send it to adversaries. And they do so…

Read More

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data Christian Ali Bravo 05 Nov 2025  •  , 4 min. read Scams and other threats that are doing the rounds on messaging apps like WhatsApp are a stark reminder of how easily even trusted platforms can be weaponized against us. One deceptive tactic that has gained traction recently involves tricking people into sharing their phone screens during a…

Read More

Cloudflare Scrubs Aisuru Botnet from Top Domains List

For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru’s overlords are using the botnet to boost their malicious domain rankings, while simultaneously attacking the company’s domain name system (DNS) service. The #1 and #3 positions in…

Read More

Gotta fly: Lazarus targets the UAV sector

ESET researchers have recently observed a new instance of Operation DreamJob – a campaign that we track under the umbrella of North Korea-aligned Lazarus – in which several European companies active in the defense industry were targeted. Some of these are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea’s current efforts to scale up its drone program. This blogpost discusses the broader geopolitical implications…

Read More