ESET researchers discover a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud ...
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts ...
ESET researchers uncover new Rust-based tools that we named MDeployer and MS4Killer and that are actively utilized by a new ransomware group called Embargo.
Some cybercriminal groups are sophisticated, create advanced schemes, cooperate with other attackers and do everything to stay under the radar. Then there are threat actors like CosmicBeetle ...
Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers ...
The average time it takes bad actors to weaponize a vulnerability before or after a patch is released shrank from 63 days in 2018-2019 to a mere five days last year ...
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship ...
Master's Degree in Computer Science from Masaryk University in Brno.
Master’s degree in Computer Security at Czech Technical University in Prague. What is your golden rule for cyberspace? Be cautious about what you share. Position and history at ESET: I joined ...