NEWSROOM

News Highlights

Comprehensive collection of ESET News, including the highest performing press releases, research, and thought leadership content gathered on single page.
Filter News
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

ESET researchers discovered and disclosed code execution vulnerabilities (CVE⁠-⁠2024⁠-⁠7262 and CVE-2024-7263) in WPS Office for Windows, exploited by APT-C-60 to target East Asian countries. After identifying and analyzing the root cause, both vulnerabilities were patched. The exploits involved remote code execution and the manipulation of the custom protocol handler.

Old devices, new dangers: The risks of unsupported IoT tech

Old devices, new dangers: The risks of unsupported IoT tech

Outdated devices pose a security threat as they become vulnerable to cyber-attacks when manufacturer support ends. Exploited devices can be used for malicious activities, including surveillance and data theft. To mitigate risk, consider repurposing old devices in a disconnected manner or ensuring secure disposal. Upgrading to modern, supported devices is crucial for maintaining cybersecurity.

Why scammers want your phone number

Why scammers want your phone number

Phone numbers are valuable targets for scammers, as they can be used for smishing, hacking, call forwarding, SIM swaps, and Caller ID spoofing. These tactics can lead to financial scams, corporate data phishing, and CEO fraud. To stay safe, individuals and businesses should validate requests, secure their accounts, limit public exposure, use mobile security, and avoid SMS-based authentication.

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Organizations must resist attributing IT meltdowns to exceptional circumstances, instead conducting thorough post-mortems. While cyber-resilience plans can help, exceptional incidents may render them inadequate. It’s crucial to review incidents, consider reliance on single vendors, and promote diversified product selection to lower risk. Utilizing outdated technology poses a significant cyber risk and should be avoided.