Threat Landscape

The Threat Report, February 2023

Threat actors remained formidable adversaries during the final months of 2022, and the Trellix Advanced Research Center countered by adding even more threat intelligence resources to our team of hundreds of elite security analysts and researchers. “In other words: we’ve taken our threat intelligence to the next level. To bring calm to your SecOps chaos […]

The Threat Report, February 2023 Read More »

Threat Report, T3 2022

Welcome to the T3 2022 issue of the ESET Threat Report! In 2022, an unprovoked and unjustified attack on Ukraine shocked the world, bringing devastating effects on the country and its population. The war continues to impact everything from energy prices and inflation to cyberspace, which ESET researchers and analysts have monitored extensively throughout the

Threat Report, T3 2022 Read More »

Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

Introduction and summary Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four

Cyber Protection Operation Centers Report: Ransomware dominates threat landscape Read More »

Threat Report T1 2022

Welcome to the T1 2022 issue of the ESET Threat Report! After more than two years of shielding from a global pandemic, we get a reward: war! Several conflicts are raging in different parts of the world, but for us, this one is different. Right across Slovakia’s eastern borders, where ESET has its HQ and

Threat Report T1 2022 Read More »

How are Australian Companies Adapting to the New Threat Landscape?

Despite the common perception that Australian companies are mature in terms of their cybersecurity postures a recent Ecosystm study reveals the opposite. As companies move more resources to the cloud, increase IoT usage, and employees increasingly work remotely, a new approach to cybersecurity is required. A recent study based on 204 interviews with Australian cybersecurity

How are Australian Companies Adapting to the New Threat Landscape? Read More »

Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion

In Q1 2022, Kroll observed a 54% increase in phishing attacks being used for initial access in comparison with Q4 2021. Email compromise and ransomware were the two most common threat incident types, highlighting the integral part played by end users in the intrusion lifecycle. Kroll continues to observe widely-publicized vulnerabilities such as ProxyShell and

Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion Read More »