Latest Articles

Danabot: Analyzing a fallen empire

Danabot: Analyzing a fallen empire

Danabot: Analyzing a fallen empire

ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation

Tomáš Procházka22 May 2025


Lumma Stealer down for the count

Lumma Stealer down for the count

Lumma Stealer down for the count

The bustling enterprise, now disrupted in a global operation including ESET, was notorious for going after all manner of sensitive data

Editor22 May 2025


ESET takes part in global operation to disrupt Lumma Stealer

ESET takes part in global operation to disrupt Lumma Stealer

ESET takes part in global operation to disrupt Lumma Stealer

Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation

Jakub Tomanek21 May 2025


The who, where, and how of APT attacks in Q4 2024–Q1 2025

The who, where, and how of APT attacks in Q4 2024–Q1 2025

The who, where, and how of APT attacks in Q4 2024–Q1 2025

ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report

Editor19 May 2025


ESET APT Activity Report Q4 2024–Q1 2025

ESET APT Activity Report Q4 2024–Q1 2025

ESET APT Activity Report Q4 2024–Q1 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025

Jean-Ian Boutin19 May 2025


Sednit abuses XSS flaws to hit gov't entities, defense companies

Sednit abuses XSS flaws to hit gov't entities, defense companies

Sednit abuses XSS flaws to hit gov't entities, defense companies

Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU

Editor15 May 2025


Operation RoundPress

Operation RoundPress

Operation RoundPress

ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities

Matthieu Faou15 May 2025


How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)

How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)

How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)

Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.

Editor12 May 2025


Catching a phish with many faces

Catching a phish with many faces

Catching a phish with many faces

Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly

Camilo Gutiérrez Amaya09 May 2025


Beware of phone scams demanding money for ‘missed jury duty’

Beware of phone scams demanding money for ‘missed jury duty’

Beware of phone scams demanding money for ‘missed jury duty’

When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.

Phil Muncaster07 May 2025


Toll road scams are in overdrive: Here’s how to protect yourself

Toll road scams are in overdrive: Here’s how to protect yourself

Toll road scams are in overdrive: Here’s how to protect yourself

Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam.

Phil Muncaster06 May 2025


RSAC 2025 wrap-up – Week in security with Tony Anscombe

RSAC 2025 wrap-up – Week in security with Tony Anscombe

RSAC 2025 wrap-up – Week in security with Tony Anscombe

From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions

Editor02 May 2025


Apt Activity Report
MDR Protection