-
.
@zuzana_hromcova and@Robert_Lipovsky will present on how AT commands get misused for GSM fingerprinting in#Attor and explore tactics, techniques and procedures of the world’s most dangerous attackers. Check out#ESETresearch at#BlueHat IL! https://www.bluehatil.com/schedule -
DE | Die
#Winnti Gruppe hat während der Proteste in Hongkong Attacken gegen Universitäten in der Sonderverwaltungszone gestartet. ESET Forscher Mathieu Tartare analysierte die Angriffe:#ESET#WeLiveSecurity#ESETresearch#Hongkonghttps://www.welivesecurity.com/deutsch/2020/01/31/winnti-group-attackiert-universitaeten-in-hongkong/ … -
EN |
@mathieutartare on#Winnti Group targeting universities in Hong Kong. https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/ … .#ESET#WeLiveSecurity#ESETresearch#HongKong -
#ESETresearch uncovered a new campaign of the#Winnti Group targeting#HongKong universities with ShadowPad and Winnti.@mathieutartare https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/ … 1/3pic.twitter.com/d57V1rhBR1
Prikaži ovu nit -
.
@Malpedia now shows URLs as meta data enriched entries with titles, date, authors, and more. Check entries for#ESETresearch here! https://malpedia.caad.fkie.fraunhofer.de/library?search=ESET+Research … -
Exciting news for the Industrial Control Systems community! As of last week, The
@MITREattack knowledge base of#cybersecurity tactics and techniques also includes a separate framework specifically for#ICS, with major contributions from#ESETresearch. https://collaborate.mitre.org/attackics/index.php/Main_Page … pic.twitter.com/vUftMjTgRW
-
Happy New Year!

From all the #ESETresearch labs around the world, we wish you safe and successful #2020, wherever it will take you.#EnjoySaferTechnologypic.twitter.com/nbNNxZn51q
-
Investigando un
#ciberataque en Europa Central y Medio Oriente,#ESETresearch descubrió un descargador muy inusual. Además de otras técnicas no tradicionales,#DePriMon#malware también se presenta como un monitor de impresión predeterminado.
pic.twitter.com/7HymeoIbza
-
After years of relying on click fraud, ad injection, social network fraud and credential stealing,
#Stantinko botnet has started to mine#Monero. Today,#ESETresearch dives deeper into Stantinko's new#cryptomining business model. https://welivesecurity.com/2019/11/26/stantinko-botnet-adds-cryptomining-criminal-activities/ …pic.twitter.com/RL4vhxbQJP
-
ESET CTO
@ysheyjmalcho took time at#Canon and#ESET Security Days in Japan to give credit to#ESETresearch talks at#AVAR2019. However, he had some fresh news from our kitchen too. He gave insights to ESET latest#enterprise technology which now offers full disk encryption.pic.twitter.com/Dbx25J3nDO
-
When an analyst encounters a rare custom malware sample involved in, say, an APT, the 'Rich Header' structure could provide some helpful clues. Learn how to leverage it at
#AVAR2019 cybersecurity conference.#ESETresearch Nov 7@pkalnai & Michal Poslusny. https://www.avar2019.org/agenda/day-1/rich-headers-leveraging-this-mysterious-artifact-of-the-pe-format-for-threat-hunting …pic.twitter.com/3h2E7OeUfe
-
#ATTOR cyberespionage platform is focusing on high-profile targets, using rare AT commands for GSM fingerprinting functionality. Learn more about it during#AVAR2019 cybersecurity conference from@zuzana_hromcova out of#ESETresearch on Nov 8. https://www.avar2019.org/agenda/day-2/attor-spy-platform-with-curious-gsm-fingerprinting …pic.twitter.com/Gn5RirUquX
-
Great work of our Android guru
@LukasStefanko. Two of his contributions for new mobile attack techniques were added to@MITREattack.#ESETresearch https://twitter.com/LukasStefanko/status/1189451786228248576 …
-
At the peak of its criminal activity, the
#Buhtrap group caused significant losses to Russian financial institutions. Don't miss the presentation during#AVAR2019 cybersecurity conference to see@cherepanov74 &@jiboutin live November 8.#ESETresearch https://www.avar2019.org/agenda/day-2/buhtrap-metamorphosis-from-cybercrime-to-cyberespionage …pic.twitter.com/fgTnyzhHN1
-
The server must already be compromised, but I hope you've already said good-bye to SQL Server 2014.... thanks for your
#ESETResearch https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/ … -
Despite being implicated in the high profile
#DNC hack in 2016, the Dukes APT group managed to stay completely under the radar for several years. Yet, as newest#ESETresearch uncovers, they never ceased their#espionage activities.@welivesecurity https://bit.ly/35Hm3Te pic.twitter.com/wHkRlf6ffP
-
In the latest discovery,
#ESETresearch dissects the updated arsenal of the#WinntiGroup, known for its espionage capabilities. After releasing initial warnings in March 2019, our researchers continued to investigate in new directions…@WeLiveSecurity http://bit.ly/2nQ7n37 pic.twitter.com/HxAlR2aYqp
-
Protege más de 110 millones de usuarios en todo el mundo, desde las pequeñas empresas hasta las grandes corporaciones, sus operaciones están en buenas manos con ESET. . .
#ESET#malware#socialengineering#ESETresearch#welivesecurity#cybersecuritypic.twitter.com/KDQTJXfPoH
-
Starting with the telemetry data gathered by ESET’s
#UEFI scanner,#ESETresearch machine learning specialists and malware researchers devised a method to spot rare UEFI/based#malware.#cybersecurity https://www.welivesecurity.com/2019/10/08/needles-haystack-unwanted-uefi-components/ … https://twitter.com/ESETresearch/status/1181524131935916032/photo/1pic.twitter.com/o6RUEpRpNR -
Top
#ESETresearch heading to#VirusBulletin. In the annual meetup of leading researchers we will have 6 speakers. See the schedule and stay tuned for more on#Buhtrap;#RichHeaders;#cyberesespionage platform#Attor & take a look at 3 decades of malware. https://virusbulletin.com/conference/vb2019/programme/ …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.