atlas
des
actus
Eset
24 avril
09h00
The calm before the ransom: What you see is not all there is
A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
23 avril
08h59
GopherWhisper: A burrow full of malware
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
21 avril
08h55
New NGate variant hides in a trojanized NFC payment app
ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
20 avril
09h00
What the ransom note won’t say
An attack is what you see, but a business operation is what you’re up against
17 avril
09h00
That data breach alert might be a trap
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
16 avril
12h00
Supply chain dependencies: Have you checked your blind spot?
Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
10 avril
09h00
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
If you’ve been a victim of fraud, you’re likely already a lead on a sucker list’ - and if you’re not careful, your ordeal may be about to get worse.
07 avril
09h00
As breakout time accelerates, prevention-first cybersecurity takes center stage
Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.
01 avril
09h00
Digital assets after death: Managing risks to your loved one’s digital estate
Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
31 mars
08h27
This month in security with Tony Anscombe - March 2026 edition
The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience...
27 mars
10h38
RSAC 2026 wrap-up - Week in security with Tony Anscombe
This year, AI agents took the center stage - as a defensive capability, but more pressingly as a risk many organizations haven’t caught up with
07h00
A cunning predator: How Silver Fox preys on Japanese firms this tax season
Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them
25 mars
10h00
Virtual machines, virtually everywhere - and with real security gaps
Cloud VMs offer unmatched speed, scale and flexibility - all of which could eventually count for little if they’re left to fend for themselves
24 mars
10h00
Cloud workload security: Mind the gaps
As IT infrastructure expands, visibility and control often lag behind - until an incident forces a reckoning
20 mars
10h00
Move fast and save things: A quick guide to recovering a hacked account
What you do - and how fast - after an account is compromised often matters more than it may seem
19 mars
09h55
EDR killers explained: Beyond the drivers
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers
13 mars
10h00
Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to hack’ widely-used facial recognition systems - and he’ll demo it all at RSAC 2026
12 mars
14h17
Cyber fallout from the Iran war: What to have on your radar
The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.
10 mars
09h58
Sednit reloaded: Back in the trenches
The resurgence of one of Russia’s most notorious APT groups
06 mars
10h00
What cybersecurity actually does for your business
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or...
05 mars
10h00
How SMBs use threat research and MDR to build a defensive edge
We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the...
04 mars
10h00
Protecting education: How MDR can tip the balance in favor of schools
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help...
28 février
10h00
This month in security with Tony Anscombe - February 2026 edition
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools
27 février
10h00
Mobile app permissions (still) matter more than you may think
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security...
23 février
10h00
Faking it on the phone: How to tell if a voice call is AI or not
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.
19 février
10h30
PromptSpy ushers in the era of Android threats using GenAI
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
07h21
Is Poshmark safe? How to buy and sell without getting scammed
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without...
17 février
10h00
Is it OK to let your children post selfies online?
When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
12 février
10h00
Naming and shaming: How ransomware groups tighten the screws on victims
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
10 février
10h00
Taxing times: Top IRS scams to look out for in 2026
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
04 février
10h00
OfferUp scammers are out in force: Here’s what you should know
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
02 février
10h00
A slippery slope: Beware of Winter Olympics scams and other cyberthreats
It’s snow joke - sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
30 janvier
15h20
This month in security with Tony Anscombe - January 2026 edition
The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
10h28
DynoWiper update: Technical analysis and attribution
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
28 janvier
09h59
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
27 janvier
10h00
Drowning in spam or scam emails? Here’s probably why
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons - and how to stem the tide.
23 janvier
16h58
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
10h00
Children and chatbots: What parents should know
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
22 janvier
10h00
Common Apple Pay scams, and how to stay safe
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
20 janvier
10h00
Old habits die hard: 2025’s most common passwords were as predictable as ever
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
16 janvier
10h00
Why LinkedIn is a hunting ground for threat actors - and how to protect yourself
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they...
14 janvier
10h00
Is it time for internet services to adopt identity verification?
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
13 janvier
10h00
Your personal information is on the dark web. What happens next?
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
08 janvier
10h00
Credential stuffing: What it is and how to protect yourself
Reusing passwords may feel like a harmless shortcut - until a single breach opens the door to multiple accounts
29 décembre
10h00
This month in security with Tony Anscombe - December 2025 edition
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
23 décembre
10h00
A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
22 décembre
09h55
Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
18 décembre
10h00
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of...
16 décembre
09h50
ESET Threat Report H2 2025
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
12 décembre
15h22
Black Hat Europe 2025: Was that device designed to be on the internet at all?
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found