Threat Landscape

Healthcare Cyber Security Conference 2023

This conference is about raising awareness of the evolving cyber threat landscape specific to health organisations, developing critical capabilities, implementing processes for prevention and recovery, building resilience, and ensuring a cyber security culture. It is an opportunity to gather a diverse mix of technical, risk, and compliance teams as well as clinical leaders who are […]

Healthcare Cyber Security Conference 2023 Read More »

Threat Report, T3 2022

Welcome to the T3 2022 issue of the ESET Threat Report! In 2022, an unprovoked and unjustified attack on Ukraine shocked the world, bringing devastating effects on the country and its population. The war continues to impact everything from energy prices and inflation to cyberspace, which ESET researchers and analysts have monitored extensively throughout the

Threat Report, T3 2022 Read More »

Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

Introduction and summary Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four

Cyber Protection Operation Centers Report: Ransomware dominates threat landscape Read More »

Threat Report T1 2022

Welcome to the T1 2022 issue of the ESET Threat Report! After more than two years of shielding from a global pandemic, we get a reward: war! Several conflicts are raging in different parts of the world, but for us, this one is different. Right across Slovakia’s eastern borders, where ESET has its HQ and

Threat Report T1 2022 Read More »

How are Australian Companies Adapting to the New Threat Landscape?

Despite the common perception that Australian companies are mature in terms of their cybersecurity postures a recent Ecosystm study reveals the opposite. As companies move more resources to the cloud, increase IoT usage, and employees increasingly work remotely, a new approach to cybersecurity is required. A recent study based on 204 interviews with Australian cybersecurity

How are Australian Companies Adapting to the New Threat Landscape? Read More »

Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion

In Q1 2022, Kroll observed a 54% increase in phishing attacks being used for initial access in comparison with Q4 2021. Email compromise and ransomware were the two most common threat incident types, highlighting the integral part played by end users in the intrusion lifecycle. Kroll continues to observe widely-publicized vulnerabilities such as ProxyShell and

Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion Read More »

2022 State of the Phish

Last year, we titled our introduction “A Year Like No Other.” We could easily have repeated that heading to describe 2021. The year has left many organizations contemplating what “normal” will mean for their workforces going forward. Along with hybrid and remote work options, organizations are mulling the best ways to keep employees connected and

2022 State of the Phish Read More »