Generic filters

Malware

Threat Report, T3 2022

Welcome to the T3 2022 issue of the ESET Threat Report! In 2022, an unprovoked and unjustified attack on Ukraine shocked the world, bringing devastating effects on the country and its population. The war continues to impact everything from energy prices and inflation to cyberspace, which ESET researchers and analysts have monitored extensively throughout the …

Threat Report, T3 2022 Read More »

OT/IoT Security Report, 2022 2H Review

The cyber threat landscape is constantly in flux, with new threats emerging and old ones evolving. As technology advances, so do the methods that malicious actors use to gain access to sensitive information or launch disruptive attacks. Cyberattacks focusing on IoT-connected devices present an additional challenge for critical infrastructure organizations in 2023, due to the …

OT/IoT Security Report, 2022 2H Review Read More »

The Near and Far Future of Ransomware Business Models

This research paper explores the position of ransomware in cybercrime and what would trigger changes in ransomware business models. Ransomware has evolved into a malware used to cause major problems for enterprises, governments, healthcare, and critical infrastructure, but other cybercriminal business models — ones that can generate significantly more illicit profit — raises an interesting …

The Near and Far Future of Ransomware Business Models Read More »

Global Threat Report, Vol.1 2022

“The future of security is open. In a world of dynamic, fast-moving, and well-resourced threat actors, digital security’s best hope lies in bringing like-minded defenders together around platforms that are as open and inter-operable as possible.” – Nate Fick U.S. Ambassador at Large for Cyberspace & Digital Policy and Formerly Elastic Security General Manager and …

Global Threat Report, Vol.1 2022 Read More »

Joint cybersecurity advisory

 2021 Top MalwareStrains This joint Cybersecurity Advisory (CSA) was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC). This advisory provides details on the top malware strains observed in 2021. Malware, short for “malicious software,” can compromise a system by performing an unauthorized function or process. Malicious cyber …

Joint cybersecurity advisory Read More »

2022 Social Engineering Report

Social engineering is the preeminent component of the overwhelming majority of cyberattacks today. Whether the goal of a threat actor is to directly perpetrate fraud, harvest credentials, or install malware, at some point a human being must be coerced into taking an action on the actors’ behalf. This fact is the basis for Proofpoint’s People-Centric …

2022 Social Engineering Report Read More »

Threat Report T1 2022

Welcome to the T1 2022 issue of the ESET Threat Report! After more than two years of shielding from a global pandemic, we get a reward: war! Several conflicts are raging in different parts of the world, but for us, this one is different. Right across Slovakia’s eastern borders, where ESET has its HQ and …

Threat Report T1 2022 Read More »