Android Trojan steals money from victims’ PayPal account
ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s …
Old and new OpenSSH backdoors threaten Linux servers
OpenSSH, a suite of networking software that allows secure communications over an unsecured network, is the most common tool for system administrators to manage rented Linux …
VestaCP users warned about possible server compromise
Unknown attackers have compromised the official distribution of the VestaCP hosting control panel solution to harvest server IPs and admin credentials. That information was …
GreyEnergy group targeting critical infrastructure with espionage
ESET has uncovered details of a successor to the BlackEnergy APT group. Named GreyEnergy by ESET, this threat actor focuses on espionage and reconnaissance, quite possibly in …
Researchers link Industroyer to NotPetya
ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the Ukraine energy sector that resulted in blackouts …
LoJax: First-ever UEFI rootkit detected in a cyberattack
ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax, this rootkit was part of a campaign …
Bogus finance apps on Google Play target users worldwide
ESET researchers have discovered malicious apps impersonating various financial services and the Austrian cryptocurrency exchange Bitpanda on Google Play. The fake apps …
ESET’s new line of enterprise security solutions now available in select countries
ESET announced the general availability of its new line of security solutions designed to help enterprise IT teams prevent, detect, respond to and predict cyber threats. …
Most IT decision makers believe AI is the silver bullet to cybersecurity challenges
New research from ESET reveals that three in four IT decision makers (75%) believe that AI and ML are the silver bullet to solving their cybersecurity challenges. In the past …
BackSwap Trojan exploits standard browser features to empty bank accounts
Creating effective and stealthy banking malware is becoming increasingly difficult, forcing malware authors to come up with innovative methods. The latest creative burst in …
New infosec products of the week: March 2, 2018
Demisto brings visibility into SOC metrics Demisto’s latest release of its Security Operations Platform enables customers to leverage the incident metrics through …
Is that smart device secure, and will it protect your privacy?
The decision to introduce a new smart device into your home should come only after you’ve answered these two questions affirmatively: “Will the device improve the …