SecurityBrief New Zealand logo
New Zealand's leading source of cybersecurity and cyber-attack news

ESET news stories - Page 2

Story image
Malware
Cybercriminals leverage remote desktop protocol to brute force attacks
Remote Desktop Protocol (RDP) attacks surged during 2020, and their severity should not be underestimated.
Story image
Endpoint Protection
ESET brings endpoint security platform to Australia
ESET Protect is designed to automate ESET security solutions across on-premise and cloud environments for businesses of all sizes.
Story image
Cybersecurity
ESET investigates Australians' attitudes to financial technology
According to ESET, financial technology will play a critical role in personal and societal economic recovery in the wake of COVID-19, and it has never been more important that FinTech solutions are adequately protected.
Story image
Endpoint Protection
IDC names ESET a Major Player second year running
“ESET is strong in the areas of threat research, especially around Android malware identification and behavior detection.”
Story image
Cybersecurity
Heightened stress means greater security risks, report finds
80% of companies say that an increased cybersecurity risk caused by human factors has posed a challenge during the COVID-19 pandemic, particularly in times of heightened stress.
Story image
Cybersecurity
ESET launches Microsoft 365 security software solution
The solution allows for total control and visibility over threats, with immediate notification when the detection of malware occurs.
Story image
Mobile Security
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."
Story image
Malware
Emotet malware is on a rampage after months of silence
CERT agencies around the world are reporting a surge in cyber attacks related to the Emotet malware, which is being distributed by email.
Story image
Apple
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."
Story image
Cryptocurrency
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Story image
Microsoft
How does MSFT Defender compare to ESET?
Although Microsoft Defender has gained market share and made some advancements in their offerings, it is not a silver bullet, writes Chillisoft's CEO.
Story image
Cybersecurity
7 VPN services leaked data of 20 million users - report
"The report calls into question the providers’ security practices and dismisses their claims of being no-log VPN services."
Story image
Malware
ESET uncovers chat app malware spying and stealing user's data
The Welcome Chat espionage app belongs to a known Android malware family and shares infrastructure with a previously documented espionage campaign named BadPatch, which also targeted the Middle East.
Story image
Malware
Report: Brute-force attacks feed on remote working vulnerabilities
A new report from ESET has detailed the extent to which attackers employ brute-force tactics to infiltrate remote desktop protocols.
Story image
LinkedIn
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing.
Story image
Cloud
Microsoft warns of huge email phishing scam
The phishing campaign installs NetSupport Manager remote admin tool to take over and execute commands. 
Story image
Cybersecurity
ESET included in Forrester Enterprise EDR report
The report provides an overview of the technology players in the EDR market and offers insights into understanding their capabilities.
Story image
Remote Working
Twitter employees can choose to work from home forever
“If our employees are in a role and situation that enables them to work from home and they want to continue to do so forever, we will make that happen."
Story image
Phishing
WHO urges caution after emails, passwords stolen
Approximately 450 active WHO email addresses and passwords, and emails belonging to others working on fighting COVID-19, were leaked on the internet.
Story image
Remote Working
ESET launches resource to protect remote workers during COVID-19
"If adequate security measures aren’t implemented on every device or network that connects to the corporate network, bad actors can go undetected."
Story image
Cybersecurity
Interview: ESET Australia's Kelly Johnson outlines channel plans
We chatted to Johnson about her appointment, her current role and ESET's plans for the Australian channel market.
Story image
Cloud
Microsoft IE vulnerability to go unpatched until mid-Feb
A blog post from security vendor ESET has outlined the risk of the zero-day for those who are still using the relic browser of internet-past.
Story image
Partner Programme
Kaspersky named top dog in Canalys channel satisfaction report
The company was named the top cybersecurity vendor for channel satisfaction after achieving the highest overall rating against 10 others.
Story image
Cybersecurity
ESET urges parents to consider security protection for their children
While many parents worry about their child’s online activity, many are not taking precautionary measures, according to new insights from ESET.