The year 2025 was marked by record losses from attacks and fraud in the cryptocurrency universe. In the first half of the year alone, thefts totaled $2.17 billion, surpassing the total value recorded in 2024, according to Chainalysis. Projections indicate that 2025 could end with more than $4…
Read More...
Browsing Tag
Research Lab
Five key actions to take after discovering a cyberattack
The number of data breaches in 2024, investigated by Verizon, increased by 20 percentage points in the total number of incidents compared to the previous year. ESET, a leading company in proactive threat detection, asserts that prior…
How to detect fake job applicants: corporate espionage with malicious informants
In July 2024, cybersecurity provider KnowBe4 began observing suspicious activity related to a new employee who started manipulating and transferring potentially harmful files and attempted to run unauthorized software. It was later!-->…
Cybersecurity myths that can put you at risk: ESET analyzes 5 common ones
October marks Cybersecurity Awareness Month, a global initiative to strengthen safe habits in the digital environment. In the Latin American region, cybersecurity risks are specific. According to the latest ESET Security Report 2025, 1 in!-->…
Credential stuffing: the risk of repeating passwords and how to protect yourself
Credential stuffing is a type of cyberattack in which malicious actors use leaked usernames and passwords to log in to accounts and services other than the one that was leaked. The success of these attacks relies on the habit of reusing the…
Scams leveraging voice cloning with Artificial Intelligence are on the rise
It's no surprise that Artificial Intelligence has revolutionized the world, and that cybercriminals have taken advantage of all this potential to create highly realistic and sophisticated targeted social engineering attacks. Techniques…