[
**ESET Research** ⢠28 Feb 2025 ⢠1 min. read
ESET Research
Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani
**ESET Research** ⢠28 Feb 2025 ⢠1 min. read
](/en/podcasts/threat-report-h2-2024-infostealer-shakeup-new-attack-vector-mobile-nomani/ "Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani")
[
**MatÄj HavrĂĄnek** ⢠20 Feb 2025 ⢠21 min. read
ESET Research
DeceptiveDevelopment targets freelance developers
**MatÄj HavrĂĄnek** ⢠20 Feb 2025 ⢠21 min. read
](/en/eset-research/deceptivedevelopment-targets-freelance-developers/ "DeceptiveDevelopment targets freelance developers")
[
**Facundo Muùoz** ⢠22 Jan 2025 ⢠9 min. read
ESET Research
PlushDaemon compromises supply chain of Korean VPN service
**Facundo Muùoz** ⢠22 Jan 2025 ⢠9 min. read
](/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/ "PlushDaemon compromises supply chain of Korean VPN service")
Next
[
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
](/en/business-security/untangling-hiring-dilemma-how-security-solutions-free-up-hr-processes/ "Untangling the hiring dilemma: How security solutions free up HR processes")
[
Business Security
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
](/en/business-security/mdr-unlocking-the-power-of-enterprise-grade-security-for-businesses-of-all-sizes/ "MDR: Unlocking the power of enterprise-grade security for businesses of all sizes")
### Latest Articles
[
Critical Infrastructure
When IT meets OT: Cybersecurity for the physical world
Critical Infrastructure
When IT meets OT: Cybersecurity for the physical world
While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure canât afford to dismiss the OT threat
**Phil Muncaster** ⢠14 Mar 2025
](/en/critical-infrastructure/when-it-meets-ot-cybersecurity-physical-world/ "When IT meets OT: Cybersecurity for the physical world")
* * *
[
Cybercrime
Donât let cybercriminals steal your Spotify account
Cybercrime
Donât let cybercriminals steal your Spotify account
Listen up, this is sure to be music to your ears â a few minutes spent securing your account today can save you a ton of trouble tomorrow
**Editor** ⢠11 Mar 2025
](/en/cybersecurity/cybercriminals-steal-spotify-account/ "Donât let cybercriminals steal your Spotify account")
* * *
[
Business Security
AI-driven deception: A new face of corporate fraud
Business Security
AI-driven deception: A new face of corporate fraud
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses
**Phil Muncaster** ⢠10 Mar 2025
](/en/cybersecurity/ai-driven-deception-new-face-corporate-fraud/ "AI-driven deception: A new face of corporate fraud")
* * *
[
Kids Online
Kids behaving badly online? Here's what parents can do
Kids Online
Kids behaving badly online? Here's what parents can do
By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable set of life lessons for a new digital age
**Phil Muncaster** ⢠05 Mar 2025
](/en/kids-online/kids-behaving-badly-online-heres-how-parents-can-help/ "Kids behaving badly online? Here's what parents can do")
* * *
[
WeLiveScience
Martin Rees: Post-human intelligence â a cosmic perspective | Starmus highlights
WeLiveScience
Martin Rees: Post-human intelligence â a cosmic perspective | Starmus highlights
Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution
**Editor** ⢠03 Mar 2025
](/en/we-live-science/martin-rees-post-human-intelligence-cosmic-perspective-starmus-highlights/ "Martin Rees: Post-human intelligence â a cosmic perspective | Starmus highlights")
* * *
[
ESET Research
Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani
ESET Research
Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani
Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media
**ESET Research** ⢠28 Feb 2025
](/en/podcasts/threat-report-h2-2024-infostealer-shakeup-new-attack-vector-mobile-nomani/ "Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani")
* * *
[
WeLiveScience
Bernhard SchoĚlkopf: Is AI intelligent? | Starmus highlights
WeLiveScience
Bernhard SchoĚlkopf: Is AI intelligent? | Starmus highlights
With AI's pattern recognition capabilities well-established, Mr. SchĂślkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?
**Editor** ⢠27 Feb 2025
](/en/we-live-science/bernhard-scholkopf-is-ai-intelligent-starmus-highlights/ "Bernhard SchoĚlkopf: Is AI intelligent? | Starmus highlights")
* * *
[
Video
This month in security with Tony Anscombe â February 2025 edition
Video
This month in security with Tony Anscombe â February 2025 edition
Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI â it's a wrap on another month filled with impactful security news
**Editor** ⢠26 Feb 2025
](/en/videos/month-security-tony-anscombe-february-2025-edition/ "This month in security with Tony Anscombe â February 2025 edition")
* * *
[
WeLiveScience
Laurie Anderson: Building an ARK | Starmus highlights
WeLiveScience
Laurie Anderson: Building an ARK | Starmus highlights
The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times
**Editor** ⢠24 Feb 2025
](/en/we-live-science/laurie-anderson-building-ark-starmus-highlights/ "Laurie Anderson: Building an ARK | Starmus highlights")
* * *
[
Video
Fake job offers target software developers with infostealers
Video
Fake job offers target software developers with infostealers
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers
**Editor** ⢠20 Feb 2025
](/en/videos/fake-job-offers-target-coders-infostealers/ "Fake job offers target software developers with infostealers")
* * *
[
ESET Research
DeceptiveDevelopment targets freelance developers
ESET Research
DeceptiveDevelopment targets freelance developers
ESET researchers analyzed a campaign delivering malware bundled with job interview challenges
**MatÄj HavrĂĄnek** ⢠20 Feb 2025
](/en/eset-research/deceptivedevelopment-targets-freelance-developers/ "DeceptiveDevelopment targets freelance developers")
* * *
[
Scams
No, youâre not fired â but beware of job termination scams
Scams
No, youâre not fired â but beware of job termination scams
Some employment scams take an unexpected turn as cybercriminals shift from âhiringâ to âfiringâ staff
**Phil Muncaster** ⢠18 Feb 2025
](/en/scams/no-youre-not-fired-beware-job-termination-scams/ "No, youâre not fired â but beware of job termination scams")
* * *
[](https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2024-q3-2024/ "Apt Activity Report")
[](https://www.eset.com/int/business/mdr-protection/?utm_source=welivesecurity.com&utm_medium=referral&utm_campaign=autotagging&utm_content=not-set&utm_term=en "MDR Protection")
Let us keep you
up to date
----------------------------
Sign up for our newsletters
Ukraine Crisis newsletterRegular weekly newsletterSubscribe
### Follow us
[](https://www.facebook.com/eset/ "Join our facebook fan site!")[](https://youtube.com/esetglobal "Watch our videos at YouTube Channel.")[](https://twitter.com/ESET "Visit the official WLS Twitter page.")[](https://www.linkedin.com/company/eset "Follow us on LinkedIn.")[](https://www.welivesecurity.com/rss-configurator/ "Don´t miss a single post!")
**Your account, your cookies choice**
We and our partners use cookies to give you the best optimized online experience, analyze our website traffic, and serve you with personalized ads. You can agree to the collection of all cookies by clicking "Accept all and close" or adjust your cookie settings by clicking "Manage cookies". You also have the right to withdraw your consent to cookies anytime. For more information, please see our [Cookie Policy](https://www.welivesecurity.com/en/company/cookie-policy/).
Accept all and close
Manage cookies
Essential cookies
These first-party cookies are necessary for the functioning and security of our website and the services you require. They are usually set in response to your actions to enable the use of certain functionality, such as remembering your cookie preferences, logging in, or holding items in your cart. You can´t opt out of these cookies, and blocking them via a browser may affect site functionality.
Basic Analytical Cookies
These first-party cookies enable us to measure the number of visitors/users of our website and create aggregated usage and performance statistics with the help of our trusted partners. We use them to get the basic insight into our website traffic and our campaign performance and to solve bugs on our website.
Advanced Analytical Cookies
These first or third-party cookies help us understand how you interact with our website and each offered service by enriching our datasets with data from third-party tools. We use these cookies to improve our website, services, and user experience, find and solve bugs or other problems with them, and evaluate our campaigns´ effectiveness.
Marketing cookies
These third-party cookies allow our marketing partners to track some of your activities on our website (for example, when you download or buy our product) to learn about your interests and needs and to show you more relevant targeted ads.
Accept and close
Back