The year 2025 was marked by record losses from attacks and fraud in the cryptocurrency universe. In the first half of the year alone, thefts totaled $2.17 billion, surpassing the total value recorded in 2024, according to Chainalysis. Projections indicate that 2025 could end with more than $4…
Read More...
Browsing Tag
Camilo Gutiérrez Amaya
Five key actions to take after discovering a cyberattack
The number of data breaches in 2024, investigated by Verizon, increased by 20 percentage points in the total number of incidents compared to the previous year. ESET, a leading company in proactive threat detection, asserts that prior…
How to detect fake job applicants: corporate espionage with malicious informants
In July 2024, cybersecurity provider KnowBe4 began observing suspicious activity related to a new employee who started manipulating and transferring potentially harmful files and attempted to run unauthorized software. It was later!-->…
Cybersecurity myths that can put you at risk: ESET analyzes 5 common ones
October marks Cybersecurity Awareness Month, a global initiative to strengthen safe habits in the digital environment. In the Latin American region, cybersecurity risks are specific. According to the latest ESET Security Report 2025, 1 in!-->…
Discord suffered data breach due to vendor attack: ESET analyzes it and comments
The Discord messaging platform, used by more than 200 million people each month, confirmed last Friday that it was affected by a security incident in its customer support service, managed by a third party. The third-party provider suffered…
ESET reports and summarizes 7 shocking real-life cases of scams using deepfakes
Cybercriminals have found that using artificial intelligence allows them to enhance their scams, making their deceptions more realistic and harder to detect. Recently, fake videos have surfaced impersonating internationally renowned!-->…
Investor scams on social media are on the rise with the help of artificial intelligence
Faced with financial doubts and concerns, it's no surprise that people are looking for alternatives to make their money go further. This leads users with little investment experience to become interested and take their first steps. ESET, a…
Credential stuffing: the risk of repeating passwords and how to protect yourself
Credential stuffing is a type of cyberattack in which malicious actors use leaked usernames and passwords to log in to accounts and services other than the one that was leaked. The success of these attacks relies on the habit of reusing the…
How secure is your iPhone?: ESET analyzes, explains, and makes recommendations
Apple's control over its ecosystem of devices and apps has historically been strict. Additionally, several built-in security features, such as strong encryption and containerization, help prevent data leakage and limit the spread of…
Scams leveraging voice cloning with Artificial Intelligence are on the rise
It's no surprise that Artificial Intelligence has revolutionized the world, and that cybercriminals have taken advantage of all this potential to create highly realistic and sophisticated targeted social engineering attacks. Techniques…
Expert advice to keep personal data out of the dark web
44 % of MEPs and 68 % of British MPs made it easier for their personal data to end up circulating on the dark web. The reason is that many would have registered online accounts using their official email address and entered additional…
Evasive Panda exfiltrates data from cloud services by stealing session cookies
ESET, a leading proactive threat detection company, has identified a post-compromise toolkit used by Evasive Panda to attack a government entity and a religious organization in Taiwan between 2022 and 2023. This toolkit is capable of…