ESET Resource Center
May 2023
In H1 2023, an increasing number of previously popular attack avenues turned into dead ends. This forced many cybercriminals to go back to their drawing boards in search of new ways to reach their nefarious goals. In this report, we explore several of these new attack vectors, including renewed interest in brute-forcing of exposed MS SQL services and abuse of OneNote files. We also delve into the most interesting infosec stories, such as the first double supply-chain attack that affected Windows and macOS users, and the rapid increase in digital usury on Android. And if you're looking for a glimmer of hope, then we offer more on the disruption of RedLine stealer, and Emotet having a hard time navigating the new reality with stricter security rules in place.
ESET respects your privacy. View our privacy policy.
Don't miss out
PREMIUM CONTENT
WHITE PAPERS
A Buyer’s Guide to Extended Detection and Response
Uncover the key benefits of an XDR solution, what to look for when considering purchasing, and how ESET can guide you through the whole process.
PREMIUM CONTENT
WHITE PAPERS
Cyber Threat Intelligence: A Comprehensive Guide to Your Threat Defense
Why do organizations need Cyber Threat Intelligence and what should you look for when choosing a Threat Intelligence provider? Learn more from ESET’s brand-new guide!
PREMIUM CONTENT
HANDBOOKS
Cybersecurity Insurance for Enterprises: Making an Educated Decision
Learn about why cybersecurity insurance has become a crucial tool in preventing companies from being shut down after an attack, and how to strengthen your posture.
Ready for next step?
Enter the world of enterprise protection