As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year.
ESET researchers provide a comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more ...
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates ...
This month in security with Tony Anscombe – December 2025 edition As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this ...
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow. From LinkedIn to X, GitHub to Instagram, there are plenty ...
ESET researchers discovered two previously unknown backdoors – which we named LunarWeb and LunarMail – compromising a European ministry of foreign affairs (MFA) and its diplomatic missions abroad. We ...
In this blogpost we examine the operation of AceCryptor, originally documented by Avast. This cryptor has been around since 2016 and because – throughout its existence – it has been used to pack tens ...
Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting ...
As described in our previous article, the packer configuration contains the decryption key of the packed binary as well as its original filename, its size and the execution type (EXE or DLL). The ...