ESET, a leading company in proactive threat detection, analyzes recovery scams, a type of money recovery fraud that operates as an umbrella term encompassing various predatory tactics, all aimed at the same goal: a second blow. Furthermore, it warns that if you take a moment to understand how they…
Read More...
Browsing Tag
ESET
New generation of ransomware targets Latin America with tailored attacks that cause severe damage
The Gentlemen ransomware attacked more than 250 victims in 17 countries, including Mexico, Colombia, Chile, and Argentina, and represents a new era of customized and ultra-adaptive attacks. Unlike other groups, this Ransomware as a Service…
What’s happening with infostealers and credential theft? Is your digital identity at risk?
An analysis based on the latest ESET Threat Reports reveals critical changes in the infostealer ecosystem: Although global detections decreased by 18% in the second half of 2025, attacks are now more sophisticated.
The use of artificial…
What happen if our conversations with AI chatbots are exposed or revealed?
Interaction with chatbots (ChatGPT, Gemini, Copilot, Claude, Perplexity, among others) has come to be treated as an intimate and secure space. Emotional, psychological, work-related, and medical concerns are entrusted to them. ESET, a…
ESET discovery: First Android threat using generative AI
The research team at ESET, a leading company in proactive threat detection, has discovered the first known Android malware that abuses generative AI in its execution flow to achieve persistence. Since the attackers rely on an AI model…
Recommendations to reduce credential theft: This digital risk is very common in Latin America
Credential theft is a threat that has been plaguing the world for over a decade. In Latin America, it is growing steadily in tandem with digitalization and the rise in online fraud. Last year alone, more than 2.6 million credentials were…
Oversharing and Cybersecurity: Dangers when employees share too much online
Employee advocacy has existed as a concept for over a decade. But what began as a well-intentioned way to enhance corporate profile, thought leadership, and marketing also has some unintended consequences. When professionals post about…
Malicious actors hunt and manipulate on the important LinkedIn network; we must protect ourselves
Last November, the UK's Security Service alerted members of Parliament about a foreign intelligence-gathering scheme: two LinkedIn profiles were contacting people working in British politics to request "insider information." The MI5…
Let’s reduce risks: How cybercriminals use stolen information
For cybercriminals, information represents money, an access point, and also a tool for committing new crimes. This is why personal and sensitive or private data, such as full names, contact information, credit card numbers and banking…
Cybersecurity: The malware that most attacked Android smartphones
In Latin America, the mobile landscape has very clear characteristics. The region concentrates many malware detections for Android, focusing on Mexico and Brazil, according to the latest ESET Threat Report. Unlike more northerly regions or…
ESET analyzes how cybersecurity is the new strategic pillar of business success
ESET Venezuela successfully held its 9th Technology Breakfast with media outlets and journalists specializing in cybersecurity, an essential meeting to analyze digital risks and redefine corporate protection in the era of Artificial…
Cybersecurity and cryptocurrencies: advances, risks, and lessons learned in 2025
The year 2025 was marked by record losses from attacks and fraud in the cryptocurrency universe. In the first half of the year alone, thefts totaled $2.17 billion, surpassing the total value recorded in 2024, according to Chainalysis.…