• About
  • Advertise
  • Careers
  • Contact Us
Thursday, July 10, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Home Business Security

ESET Details How War in Ukraine has Changed the Threat Landscape

by Techeconomy
August 8, 2022
in Security
4
UBA
Advertisements

ESET has released its T1 2022 Threat Report, summarising key statistics from ESET detection systems and highlighting notable examples of ESET’s cybersecurity research.

Roman Kováč ESET
Advertisements
MTN ADS
Roman Kováč

The latest issue of the ESET Threat Report recounts the various cyberattacks connected to the ongoing war in Ukraine that ESET researchers analysed or helped to mitigate. This includes the resurrection of the infamous Industroyer malware, attempting to target high-voltage electrical substations.

ESET telemetry also recorded other changes in the cyberthreat realm that might have a connection to the situation in Ukraine.

The war has also been noticeably exploited by spam and phishing threats. After the invasion on February 24, ESET telemetry detected a large spike in spam detections, as scammers started to take advantage of people trying to support Ukraine, using fictitious charities and fundraisers as lures.

The ESET T1 2022 Threat Report reviews the most important research findings, with ESET Research uncovering: the abuse of kernel driver vulnerabilities; high‑impact UEFI vulnerabilities; cryptocurrency malware targeting Android and iOS devices; a yet-unattributed campaign deploying the DazzleSpy macOS malware; and the campaigns of Mustang Panda, Donot Team, Winnti Group, and the TA410 APT group.

The report also contains an overview of the numerous talks given by ESET researchers in T1 2022, and introduces talks from the RSA and REcon conferences in June 2022, showcasing ESET Research’s discovery of Wslink and ESPecter.

These appearances will be followed by a talk at the Virus Bulletin Conference in September 2022.

Loading

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares
Tags: ESET Threat ReportUkraine
Techeconomy

Techeconomy

Next Post

6 Tips to Keep Your Home Warm and Boost Your Savings

Comments 4

  1. Pingback: ESET Particulars How Battle in Ukraine has Modified the Menace Panorama – TechEconomy.ng - Only Easy Tech
  2. Pingback: ESET Details How War in Ukraine has Changed the Threat Landscape – TechEconomy.ng | #malware | #ransomware - NATIONAL CYBER SECURITY NEWS TODAY
  3. Pingback: ESET Details How War in Ukraine has Changed the Threat Landscape – TechEconomy.ng - Heal Security Inc
  4. Pingback: Twitter account data stolen. NHS 111 hit by cyberattack. Notes on the C2C market. Update on the hybrid war against Ukraine. – hearing-loss.news

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

Security and Convenience in Smart Homes

The Privacy Trade-Off: Balancing Security and Convenience in Smart Homes

4 months ago
Is Burnout Killing Your Startup? Elite Entrepreneurs Reveal Their Secrets to Success

Is Burnout Killing Your Startup? Elite Entrepreneurs Reveal Their Secrets to Success

5 months ago

Popular News

    Connect with us

    • About
    • Advertise
    • Careers
    • Contact Us

    © 2025 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Telecoms
      • Mobility
      • Environment
      • Travel
      • StartUPs
        • Chidiverse
      • TE Insights
      • Security
    • Partners
    • Economy
      • Finance
      • Fintech
      • Digital Assets
      • Personal Finance
      • Insurance
    • Features
      • IndustryINFLUENCERS
      • Guest Writer
      • EventDIARY
      • Editorial
      • Appointment
    • TECHECONOMY TV
    • Apply
    • TBS
    • BusinesSENSE For SMEs

    © 2025 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.