News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

DeceptiveDevelopment: Attack on software developers
B2B Cyber ​​Security ShortNews

With the "DeceptiveDevelopment" campaign, cybercriminals are specifically targeting software developers looking for jobs. Victims download malware onto their computers along with a test to prove their skills. The criminals aim to obtain login credentials and steal cryptocurrency. ESET researchers have identified a new cyberthreat: In the "DeceptiveDevelopment" campaign, cybercriminals are luring freelance software developers from the cryptocurrency scene into a trap with fake job offers. The goal is to steal cryptocurrency and login credentials. The attacks target Windows, Linux, and macOS users in all regions of the world and use platforms such as LinkedIn, Upwork,...

Read more

PlushDaemon: New Chinese APT group discovered
Eset_News

The Chinese APT hacker group PlushDaemon attacks both companies and private users around the world. They use the "Slow Stepper" backdoor to spy on Windows computers and steal access data, among other things. Researchers have discovered a previously unknown Advanced Persistent Threat (APT) group: "PlushDaemon" is linked to China and has been active since at least 2019. The hackers use their "SlowStepper" hacking tool to carry out sophisticated cyber espionage attacks on Windows computers. During their attacks, they stole valuable information from private individuals and companies in East Asia, the USA and New Zealand. PlushDaemon comes into the system as a copycat PlushDaemon uses various…

Read more

Microsoft: UEFI Secure Boot vulnerability discovered
Microsoft: UEFI Secure Boot vulnerability discovered

A security software provider has discovered a security vulnerability that can be used to bypass UEFI Secure Boot. This allows criminals to inject malware when the computer starts up. Microsoft released a security patch in January to close the vulnerability. A newly discovered security vulnerability threatens the integrity of computer systems worldwide: Researchers from IT security manufacturer ESET have identified a vulnerability that can bypass the so-called UEFI Secure Boot. This function, which is intended to ensure secure system startup, is activated on most modern computers. UEFI bootkits can be infiltrated The security vulnerability (CVE-2024-7344)…

Read more

Threat Protection: APIs for IBM QRadar and Microsoft Sentinel
Threat Protection: APIs for IBM QRadar and Microsoft Sentinel

From now on, users of IBM QRadar SIEM and Microsoft Sentinel also have access to the extensive threat data of the ESET PROTECT platform and ESET Threat Intelligence via their own APIs. This strengthens their security architecture and optimizes the cybersecurity workflow. "The integration of ESET significantly increases the security level in organizations. It not only improves threat detection and incident response, but also enables security teams to make informed decisions more quickly. This increases the overall efficiency and quality of the processes," explains Michael Schröder, Strategic Business Development Manager at ESET. Seamless integration for complex security requirements...

Read more

Identify and patch vulnerabilities
Identify and patch vulnerabilities

The new software version "Vulnerability and Patch Management" supports companies in the automatic detection of vulnerabilities and in the automatic or manual patching of these. Advanced functions and dashboards make administrators' work easier. The IT security manufacturer ESET has presented its new version of ESET Vulnerability and Patch Management. The solution supports organizations even better in reliably detecting and fixing security gaps in their systems. If the software has identified vulnerabilities in operating systems or common applications, administrators can have the required patches installed automatically or intervene manually. ESET Vulnerability and Patch Management has been further expanded and offers...

Read more

GoldenJackal: Hackers attack computers isolated from the Internet
GoldenJackal: Hackers attack computers isolated from the Internet

The APT group GoldenJackal is successfully attacking targets in Europe that are well protected by air gaps. The malware spread via USB sticks to systems that were completely isolated from the Internet. The attackers probably wanted to obtain highly sensitive data in this way. The mysterious APT group GoldenJackal has attacked computers of high-ranking targets in Europe. Between August 2019 and March 2024, the hackers targeted a South Asian embassy in Belarus and repeatedly an EU government organization. Researchers from IT security manufacturer ESET have uncovered the attacks. The affected systems were completely isolated from the Internet to prevent cyberattacks....

Read more

CeranaKeeper – New APT group discovered
CeranaKeeper - New APT group discovered

Researchers have discovered a new Advanced Persistent Threat (APT) group called CeranaKeeper. It is targeting government institutions in Thailand. They have used well-known file-sharing services such as Dropbox, GitHub and OneDrive to exfiltrate large amounts of sensitive data. The attackers, who are linked to China, used tools originally associated with the Mustang Panda APT group. With new tools, CeranaKeeper continued the attacks and relied on legitimate cloud services to exfiltrate sensitive documents. This new threat group was identified by ESET as CeranaKeeper, named after the Asian honey bee offshoot "Apis Cerana". How does CeranaKeeper attack? The attacks started with...

Read more

CosmicBeetle: Hackers imitate malware
Eset_News

The hackers of the CosmicBeetle group primarily attack small and medium-sized companies. In their ransomware extortion letters, they imitate the inactive LockBit group. In addition, CosmicBeetle has joined the new ransomware service provider RansomwareHub. Researchers from the IT security manufacturer ESET have discovered new activities of the CosmicBeetle group. It is spreading ransomware to small and medium-sized companies (SMEs), mainly in Europe and Asia. It uses its ransomware ScRansom. In its extortion letters and websites, CosmicBeetle tries to exploit the reputation of the well-known, now inactive LockBit group to get victims to pay. In addition, the group is now…

Read more

NIS2 Directive: Communicating implementation with managers
NIS2 Directive: Communicating implementation with managers

A free white paper helps CISOs to speak the language of managers in order to advance the implementation of the NIS2 directive in the company and enforce compliance. The German federal government has set the course for the national implementation of the NIS2 directive. The federal cabinet has agreed on a draft law that must now go through parliament. It is therefore high time to deal with the requirements. The IT security manufacturer ESET has published a new white paper on the NIS2 directive. "NIS2 - The countdown has begun: How to promote awareness and implementation among managers" offers IT security managers...

Read more

Hackers disguise malware as AI tools
Hackers disguise malware as AI tools

AI tools such as ChatGPT, Bard or Suno are booming because they offer so many possibilities. Hackers are taking advantage of this and spreading fake AI applications to get money and data from unsuspecting interested parties - including in companies. The experts at ESET explain the current trends among cyber attackers and give tips on how companies and employees can protect themselves from these new threats. "The possibilities offered by AI tools are spectacular. AI is on everyone's lips and more and more users are using these tools in their everyday lives. Hackers are keeping a close eye on these trends and want to...

Read more