atlas des actus
  Eset
24  avril     09h00
The calm before the ransom: What you see is not all there is
   A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
23  avril     08h59
GopherWhisper: A burrow full of malware
   ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
21  avril     08h55
New NGate variant hides in a trojanized NFC payment app
   ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
20  avril     09h00
What the ransom note won’t say
   An attack is what you see, but a business operation is what you’re up against
17  avril     09h00
That data breach alert might be a trap
   Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
16  avril     12h00
Supply chain dependencies: Have you checked your blind spot?
   Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
10  avril     09h00
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
   If you’ve been a victim of fraud, you’re likely already a lead on a sucker list’ - and if you’re not careful, your ordeal may be about to get worse.
07  avril     09h00
As breakout time accelerates, prevention-first cybersecurity takes center stage
   Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.
01  avril     09h00
Digital assets after death: Managing risks to your loved one’s digital estate
   Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
31  mars     08h27
This month in security with Tony Anscombe - March 2026 edition
   The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience...
27  mars     10h38
RSAC 2026 wrap-up - Week in security with Tony Anscombe
   This year, AI agents took the center stage - as a defensive capability, but more pressingly as a risk many organizations haven’t caught up with
    07h00
A cunning predator: How Silver Fox preys on Japanese firms this tax season
   Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them
25  mars     10h00
Virtual machines, virtually everywhere - and with real security gaps
   Cloud VMs offer unmatched speed, scale and flexibility - all of which could eventually count for little if they’re left to fend for themselves
24  mars     10h00
Cloud workload security: Mind the gaps
   As IT infrastructure expands, visibility and control often lag behind - until an incident forces a reckoning
20  mars     10h00
Move fast and save things: A quick guide to recovering a hacked account
   What you do - and how fast - after an account is compromised often matters more than it may seem
19  mars     09h55
EDR killers explained: Beyond the drivers
   ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers
13  mars     10h00
Face value: What it takes to fool facial recognition
   ESET’s Jake Moore used smart glasses, deepfakes and face swaps to hack’ widely-used facial recognition systems - and he’ll demo it all at RSAC 2026
12  mars     14h17
Cyber fallout from the Iran war: What to have on your radar
   The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.
10  mars     09h58
Sednit reloaded: Back in the trenches
   The resurgence of one of Russia’s most notorious APT groups
06  mars     10h00
What cybersecurity actually does for your business
   The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or...
05  mars     10h00
How SMBs use threat research and MDR to build a defensive edge
   We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the...
04  mars     10h00
Protecting education: How MDR can tip the balance in favor of schools
   The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help...
28  février     10h00
This month in security with Tony Anscombe - February 2026 edition
   In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools
27  février     10h00
Mobile app permissions (still) matter more than you may think
   Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security...
23  février     10h00
Faking it on the phone: How to tell if a voice call is AI or not
   Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.
19  février     10h30
PromptSpy ushers in the era of Android threats using GenAI
   ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
    07h21
Is Poshmark safe? How to buy and sell without getting scammed
   Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without...
17  février     10h00
Is it OK to let your children post selfies online?
   When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
12  février     10h00
Naming and shaming: How ransomware groups tighten the screws on victims
   When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
10  février     10h00
Taxing times: Top IRS scams to look out for in 2026
   It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
04  février     10h00
OfferUp scammers are out in force: Here’s what you should know
   The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
02  février     10h00
A slippery slope: Beware of Winter Olympics scams and other cyberthreats
   It’s snow joke - sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
30  janvier     15h20
This month in security with Tony Anscombe - January 2026 edition
   The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
    10h28
DynoWiper update: Technical analysis and attribution
   ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
28  janvier     09h59
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
   ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
27  janvier     10h00
Drowning in spam or scam emails? Here’s probably why
   Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons - and how to stem the tide.
23  janvier     16h58
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
   The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
    10h00
Children and chatbots: What parents should know
   As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
22  janvier     10h00
Common Apple Pay scams, and how to stay safe
   Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
20  janvier     10h00
Old habits die hard: 2025’s most common passwords were as predictable as ever
   Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
16  janvier     10h00
Why LinkedIn is a hunting ground for threat actors - and how to protect yourself
   The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they...
14  janvier     10h00
Is it time for internet services to adopt identity verification?
   Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
13  janvier     10h00
Your personal information is on the dark web. What happens next?
   If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
08  janvier     10h00
Credential stuffing: What it is and how to protect yourself
   Reusing passwords may feel like a harmless shortcut - until a single breach opens the door to multiple accounts
29  décembre     10h00
This month in security with Tony Anscombe - December 2025 edition
   As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
23  décembre     10h00
A brush with online fraud: What are brushing scams and how do I stay safe?
   Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
22  décembre     09h55
Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
   A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
18  décembre     10h00
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
   ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of...
16  décembre     09h50
ESET Threat Report H2 2025
   A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
12  décembre     15h22
Black Hat Europe 2025: Was that device designed to be on the internet at all?
   Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found