ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022
Author: WeLiveSecurity
The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group
It’s never been easier to write a convincing message that can trick you into handing over your money or personal data
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?
Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites
No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield
ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via malicious websites linked in ads that appear in Google search results
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing
Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly.