ESET, the industry-leading cybersecurity software company, has released their latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry from December 2022 through May 2023.
Here are a few highlights:
- The H1 2023 ESET Threat Report highlights the remarkable adaptability of cybercriminals: through exploiting vulnerabilities, gaining unauthorized access, compromising sensitive information, or defrauding individuals.
- Attackers developed new methods to attempt to bypass Microsoft security measures, including using weaponized OneNote files instead of Office macros. ESET researchers observed the comeback of so-called sextortion scam emails and an alarming growth of deceptive Android loan apps.
- ESET telemetry data also suggests that operators of the Emotet botnet have struggled to adapt, possibly indicating that a different group acquired the botnet.
- Leaked source code of ransomware families such as Babyk, LockBit, and Conti has been increasingly used in the development of new ransomware variants in H1 2023.
- The H1 2023 Threat Report covers December 2022 through May 2023, transitioning from a triannual to a semiannual release schedule.
The full report can be found here: https://www.welivesecurity.com/2023/07/11/eset-threat-report-h1-2023/
Related
This entry was posted on July 11, 2023 at 2:18 pm and is filed under Commentary with tags ESET. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
The Latest ESET Threat Report Has Been Released
ESET, the industry-leading cybersecurity software company, has released their latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry from December 2022 through May 2023.
Here are a few highlights:
The full report can be found here: https://www.welivesecurity.com/2023/07/11/eset-threat-report-h1-2023/
Share this:
Like this:
Related
This entry was posted on July 11, 2023 at 2:18 pm and is filed under Commentary with tags ESET. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.