ransomware

State of Cyber Threat Intelligence: 2023

THREATS ARE CONVERGING, CYCLICAL A growing body of evidence, outlined in this report, demonstrates just how extensively cyber threats are overlapping, intersecting, and relating. Furthermore, we examine why these threats—from the online spaces in which cybercriminals operate to the tactics, techniques, and procedures (TTPs) they use to execute their attacks—are cyclical and what that means […]

State of Cyber Threat Intelligence: 2023 Read More »

Automated Patch Management: Achieving the vision of tomorrow, today!

Patch management of the future is automated, fire-and-forget, and risk-based. You can achieve this vision of tomorrow, today! Strong patch compliance is the first line of defense in the war against ransomware. More than 50% of ransomware attacks are the result of poor patch compliance due to end user’s blocking patches. Look, your techs and

Automated Patch Management: Achieving the vision of tomorrow, today! Read More »

Automated Patch Management: Achieving the vision of tomorrow, today!

Patch management of the future is automated, fire-and-forget, and risk-based. You can achieve this vision of tomorrow, today! Strong patch compliance is the first line of defense in the war against ransomware. More than 50% of ransomware attacks are the result of poor patch compliance due to end user’s blocking patches. Look, your techs and

Automated Patch Management: Achieving the vision of tomorrow, today! Read More »

2022 Vulnerability Intelligence Report

Security, IT, and other teams tasked with vulnerability management and risk reduction operate in high-urgency, high-stakes environments where informed decision-making hinges on the ability to quickly find signal in a sea of perpetual noise. When a new potential threat emerges, information security professionals often find themselves needing to translate vague descriptions and untested research artifacts

2022 Vulnerability Intelligence Report Read More »

CyberSecMY 2023

In the past year, the global business sector has experienced an extraordinary level of cyberattacks, which has created challenges for security teams to respond promptly. A significant number of vulnerabilities were identified, and malicious actors are still exploiting many of them in the current year. With Malaysia’s growing dependence on technology and digital infrastructure, ensuring

CyberSecMY 2023 Read More »

ICS/OT Cybersecurity Year in Review 2022

2022 Key Findings Overview 2022 saw a breakthrough escalation in capabilities by a new modular industrial control systems (ICS) malware, PIPEDREAM, developed by the threat group, CHERNOVITE. CHERNOVITE’S PIPEDREAM toolkit has the capabilities to impact tens of thousands industrial devices that control critical infrastructure – devices that manage the electrical grid, oil and gas pipelines,

ICS/OT Cybersecurity Year in Review 2022 Read More »

Threat Report, T3 2022

Welcome to the T3 2022 issue of the ESET Threat Report! In 2022, an unprovoked and unjustified attack on Ukraine shocked the world, bringing devastating effects on the country and its population. The war continues to impact everything from energy prices and inflation to cyberspace, which ESET researchers and analysts have monitored extensively throughout the

Threat Report, T3 2022 Read More »