
Cranking out spearphishing campaigns against Ukraine with an evolved toolset
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024 02 Jul 2025 • , 6 min. read Since Russia’s full-scale invasion of Ukraine in February 2022,...

Qantas discloses cyberattack amid Scattered Spider aviation breaches
Australian airline Qantas disclosed that it detected a cyberattack on Monday after threat actors gained access to a third-party platform containing customer data. Qantas is Australia's largest airline, operating domestic and international flights across six...

Microsoft open-sources VS Code Copilot Chat extension on GitHub
Microsoft has released the source code for the GitHub Copilot Chat extension for VS Code under the MIT license. This provides the community access to the full implementation of the chat-based coding assistant, including the implementation of “agent mode,” what...

Microsoft admits to Intune forgetfulness • The Register
Microsoft Intune administrators may face a few days of stress after Redmond acknowledged a problem with security baseline customizations. The problem? Those customizations might not be saved during the update process, and the current workaround is to manually...

ESET Threat Report H1 2025: Key findings
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025 01 Jul 2025 The ESET research team has released the H1 2025 issue of the ESET Threat Report, offering a detailed look...

How cybercrooks get themselves caught • The Register
They say that success breeds complacency, and complacency leads to failure. For cybercriminals, taking too many shortcuts when it comes to opsec delivers a little more than that. In these cases, failure might mean the criminal doesn't get access to the server...

Malware sharing, data wiping and exploits
ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report 01 Jul 2025 • , 2 min. read In the latest episode of the ESET...

U.S. warns of Iranian cyber threats on critical infrastructure
U.S. cyber agencies, the FBI, and NSA issued an urgent warning today about potential cyberattacks from Iranian-affiliated hackers targeting U.S. critical infrastructure. CISA says there are no indications of an ongoing campaign but urges critical infrastructure...

US shuts down a string of North Korean IT worker scams • The Register
The US Department of Justice has announced a major disruption of multiple North Korean fake IT worker scams. The feds say that they uncovered [PDF] the North Korean IT staff working at over 100 US companies using fictitious or stolen identities and not only...

Seven months for IT worker who trashed his work network • The Register
A judge has sentenced a disgruntled IT worker to more than seven months in prison after he wreaked havoc on his employer's network following his suspension, according to West Yorkshire Police. According to the police, Mohammed Umar Taj, 31, from the Yorkshire...